Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
order and drawings_pdf.exe

Overview

General Information

Sample name:order and drawings_pdf.exe
Analysis ID:1559214
MD5:4726039e5f4d03f6f3f9cc0cd8d423a1
SHA1:3dc80b737f67481eb0385b2a25058309c7a63989
SHA256:9970fc1f94630a822d109fd53bcb3fe1ed51bd5359007e3e4f570c0f85f3a040
Tags:AgentTeslaexeuser-lowmal3
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Connects to many ports of the same IP (likely port scanning)
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evaded block containing many API calls
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses FTP
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • order and drawings_pdf.exe (PID: 7292 cmdline: "C:\Users\user\Desktop\order and drawings_pdf.exe" MD5: 4726039E5F4D03F6F3F9CC0CD8D423A1)
    • RegSvcs.exe (PID: 7360 cmdline: "C:\Users\user\Desktop\order and drawings_pdf.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.gizemetiket.com.tr", "Username": "pgizemM6", "Password": "giz95Ffg"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2085096156.0000000003670000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.2085096156.0000000003670000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.2085096156.0000000003670000.00000004.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
        • 0x33091:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
        • 0x33103:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
        • 0x3318d:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
        • 0x3321f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
        • 0x33289:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
        • 0x332fb:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
        • 0x33391:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
        • 0x33421:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
        00000000.00000002.2085096156.0000000003670000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
        • 0x305b6:$s2: GetPrivateProfileString
        • 0x2fc6f:$s3: get_OSFullName
        • 0x312ba:$s5: remove_Key
        • 0x31447:$s5: remove_Key
        • 0x322ad:$s6: FtpWebRequest
        • 0x33073:$s7: logins
        • 0x335e5:$s7: logins
        • 0x3635e:$s7: logins
        • 0x363a8:$s7: logins
        • 0x37ca6:$s7: logins
        • 0x36f42:$s9: 1.85 (Hash, version 2, native byte-order)
        00000002.00000002.4522755984.000000000252C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Click to see the 8 entries
          SourceRuleDescriptionAuthorStrings
          2.2.RegSvcs.exe.5c0000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            2.2.RegSvcs.exe.5c0000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              2.2.RegSvcs.exe.5c0000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
              • 0x33091:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
              • 0x33103:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
              • 0x3318d:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
              • 0x3321f:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
              • 0x33289:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
              • 0x332fb:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
              • 0x33391:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
              • 0x33421:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
              2.2.RegSvcs.exe.5c0000.0.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
              • 0x305b6:$s2: GetPrivateProfileString
              • 0x2fc6f:$s3: get_OSFullName
              • 0x312ba:$s5: remove_Key
              • 0x31447:$s5: remove_Key
              • 0x322ad:$s6: FtpWebRequest
              • 0x33073:$s7: logins
              • 0x335e5:$s7: logins
              • 0x3635e:$s7: logins
              • 0x363a8:$s7: logins
              • 0x37ca6:$s7: logins
              • 0x36f42:$s9: 1.85 (Hash, version 2, native byte-order)
              0.2.order and drawings_pdf.exe.3670000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Click to see the 7 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-20T10:15:08.237196+010020299271A Network Trojan was detected192.168.2.54970593.89.225.4021TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-20T10:15:08.466736+010028555421A Network Trojan was detected192.168.2.54970693.89.225.4054896TCP
                2024-11-20T10:15:08.742494+010028555421A Network Trojan was detected192.168.2.54970693.89.225.4054896TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 2.2.RegSvcs.exe.5c0000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.gizemetiket.com.tr", "Username": "pgizemM6", "Password": "giz95Ffg"}
                Source: order and drawings_pdf.exeReversingLabs: Detection: 52%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: order and drawings_pdf.exeJoe Sandbox ML: detected
                Source: order and drawings_pdf.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49704 version: TLS 1.2
                Source: Binary string: wntdll.pdbUGP source: order and drawings_pdf.exe, 00000000.00000003.2078322466.0000000003890000.00000004.00001000.00020000.00000000.sdmp, order and drawings_pdf.exe, 00000000.00000003.2074991455.00000000036B0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: order and drawings_pdf.exe, 00000000.00000003.2078322466.0000000003890000.00000004.00001000.00020000.00000000.sdmp, order and drawings_pdf.exe, 00000000.00000003.2074991455.00000000036B0000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00666CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00666CA9
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_006660DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_006660DD
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_006663F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_006663F9
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0066EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0066EB60
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0066F56F FindFirstFileW,FindClose,0_2_0066F56F
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0066F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0066F5FA
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00671B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00671B2F
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00671C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00671C8A
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00671F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00671F94

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.5:49705 -> 93.89.225.40:21
                Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.5:49706 -> 93.89.225.40:54896
                Source: global trafficTCP traffic: 93.89.225.40 ports 55010,55021,55032,55054,55020,55064,55096,55040,55069,1,55068,2,55045,55022,55044,55055,54896,55059,55008,21
                Source: global trafficTCP traffic: 192.168.2.5:49706 -> 93.89.225.40:54896
                Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
                Source: Joe Sandbox ViewIP Address: 93.89.225.40 93.89.225.40
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownDNS query: name: api.ipify.org
                Source: unknownFTP traffic detected: 93.89.225.40:21 -> 192.168.2.5:49705 220 Microsoft FTP Service
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00674EB5 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00674EB5
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                Source: global trafficDNS traffic detected: DNS query: ftp.gizemetiket.com.tr
                Source: RegSvcs.exe, 00000002.00000002.4522755984.00000000026C8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4522755984.000000000257C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4522755984.000000000252C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4522755984.000000000280C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.gizemetiket.com.tr
                Source: RegSvcs.exe, 00000002.00000002.4522755984.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: order and drawings_pdf.exe, 00000000.00000002.2085096156.0000000003670000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4520282599.00000000005C2000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                Source: order and drawings_pdf.exe, 00000000.00000002.2085096156.0000000003670000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4520282599.00000000005C2000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4522755984.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                Source: RegSvcs.exe, 00000002.00000002.4522755984.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                Source: RegSvcs.exe, 00000002.00000002.4522755984.00000000024B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.5:49704 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 0.2.order and drawings_pdf.exe.3670000.1.raw.unpack, hxAF.cs.Net Code: fM6x5OA38
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00676B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00676B0C
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00676D07 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00676D07
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00676B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00676B0C
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00662B37 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00662B37
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0068F7FF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0068F7FF

                System Summary

                barindex
                Source: 2.2.RegSvcs.exe.5c0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 2.2.RegSvcs.exe.5c0000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 0.2.order and drawings_pdf.exe.3670000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 0.2.order and drawings_pdf.exe.3670000.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 0.2.order and drawings_pdf.exe.3670000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 0.2.order and drawings_pdf.exe.3670000.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 00000000.00000002.2085096156.0000000003670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 00000000.00000002.2085096156.0000000003670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: This is a third-party compiled AutoIt script.0_2_00623D19
                Source: order and drawings_pdf.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: order and drawings_pdf.exe, 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_21a34f52-0
                Source: order and drawings_pdf.exe, 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: eSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_77515b17-b
                Source: order and drawings_pdf.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_faa506b8-5
                Source: order and drawings_pdf.exeString found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_39e71129-9
                Source: initial sampleStatic PE information: Filename: order and drawings_pdf.exe
                Source: initial sampleStatic PE information: Filename: order and drawings_pdf.exe
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00666606: CreateFileW,DeviceIoControl,CloseHandle,0_2_00666606
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0065ACC5 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_0065ACC5
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_006679D3 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_006679D3
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0064B0430_2_0064B043
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_006332000_2_00633200
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00633B700_2_00633B70
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0065410F0_2_0065410F
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_006402A40_2_006402A4
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0062E3B00_2_0062E3B0
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0065038E0_2_0065038E
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0065467F0_2_0065467F
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_006406D90_2_006406D9
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0068AACE0_2_0068AACE
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00654BEF0_2_00654BEF
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0064CCC10_2_0064CCC1
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0062AF500_2_0062AF50
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00626F070_2_00626F07
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0063B11F0_2_0063B11F
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_006831BC0_2_006831BC
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0064D1B90_2_0064D1B9
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0065724D0_2_0065724D
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0064123A0_2_0064123A
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_006293F00_2_006293F0
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_006613CA0_2_006613CA
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0063F5630_2_0063F563
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_006296C00_2_006296C0
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0066B6CC0_2_0066B6CC
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0068F7FF0_2_0068F7FF
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_006277B00_2_006277B0
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_006579C90_2_006579C9
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0063FA570_2_0063FA57
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00629B600_2_00629B60
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00627D190_2_00627D19
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0063FE6F0_2_0063FE6F
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00649ED00_2_00649ED0
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00627FA30_2_00627FA3
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00CAC5400_2_00CAC540
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0093E0E82_2_0093E0E8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0093A2102_2_0093A210
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0093AAA02_2_0093AAA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00934A582_2_00934A58
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0093DC602_2_0093DC60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00933E402_2_00933E40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_009341882_2_00934188
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05E655C02_2_05E655C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05E665D02_2_05E665D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05E67D602_2_05E67D60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05E623982_2_05E62398
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05E6B2202_2_05E6B220
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05E65CC82_2_05E65CC8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05E676802_2_05E67680
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05E600402_2_05E60040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05E6E3902_2_05E6E390
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05F514022_2_05F51402
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05F514082_2_05F51408
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05E600062_2_05E60006
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: String function: 00646AC0 appears 42 times
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: String function: 0064F8A0 appears 35 times
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: String function: 0063EC2F appears 68 times
                Source: order and drawings_pdf.exe, 00000000.00000003.2074991455.00000000037D3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs order and drawings_pdf.exe
                Source: order and drawings_pdf.exe, 00000000.00000003.2078322466.00000000039BD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs order and drawings_pdf.exe
                Source: order and drawings_pdf.exe, 00000000.00000002.2085096156.0000000003670000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename5bc4a179-7022-47b4-bc67-c0ba357abdc4.exe4 vs order and drawings_pdf.exe
                Source: order and drawings_pdf.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 2.2.RegSvcs.exe.5c0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 2.2.RegSvcs.exe.5c0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 0.2.order and drawings_pdf.exe.3670000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 0.2.order and drawings_pdf.exe.3670000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 0.2.order and drawings_pdf.exe.3670000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 0.2.order and drawings_pdf.exe.3670000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 00000000.00000002.2085096156.0000000003670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 00000000.00000002.2085096156.0000000003670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 0.2.order and drawings_pdf.exe.3670000.1.raw.unpack, N43UVggPg.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.order and drawings_pdf.exe.3670000.1.raw.unpack, N43UVggPg.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 0.2.order and drawings_pdf.exe.3670000.1.raw.unpack, Ow96S4wT.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.order and drawings_pdf.exe.3670000.1.raw.unpack, Ow96S4wT.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.order and drawings_pdf.exe.3670000.1.raw.unpack, Ow96S4wT.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.order and drawings_pdf.exe.3670000.1.raw.unpack, Ow96S4wT.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.order and drawings_pdf.exe.3670000.1.raw.unpack, MjzNdC.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.order and drawings_pdf.exe.3670000.1.raw.unpack, MjzNdC.csCryptographic APIs: 'TransformFinalBlock'
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@2/2
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0066CE7A GetLastError,FormatMessageW,0_2_0066CE7A
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0065AB84 AdjustTokenPrivileges,CloseHandle,0_2_0065AB84
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0065B134 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_0065B134
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0066E1FD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0066E1FD
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00666532 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,CloseHandle,0_2_00666532
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0067C18C CoInitializeSecurity,_memset,_memset,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_0067C18C
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0062406B CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_0062406B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeFile created: C:\Users\user\AppData\Local\Temp\aut620D.tmpJump to behavior
                Source: order and drawings_pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: order and drawings_pdf.exeReversingLabs: Detection: 52%
                Source: unknownProcess created: C:\Users\user\Desktop\order and drawings_pdf.exe "C:\Users\user\Desktop\order and drawings_pdf.exe"
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\order and drawings_pdf.exe"
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\order and drawings_pdf.exe"Jump to behavior
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                Source: order and drawings_pdf.exeStatic file information: File size 1075200 > 1048576
                Source: order and drawings_pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: order and drawings_pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: order and drawings_pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: order and drawings_pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: order and drawings_pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: order and drawings_pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: order and drawings_pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: wntdll.pdbUGP source: order and drawings_pdf.exe, 00000000.00000003.2078322466.0000000003890000.00000004.00001000.00020000.00000000.sdmp, order and drawings_pdf.exe, 00000000.00000003.2074991455.00000000036B0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: order and drawings_pdf.exe, 00000000.00000003.2078322466.0000000003890000.00000004.00001000.00020000.00000000.sdmp, order and drawings_pdf.exe, 00000000.00000003.2074991455.00000000036B0000.00000004.00001000.00020000.00000000.sdmp
                Source: order and drawings_pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: order and drawings_pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: order and drawings_pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: order and drawings_pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: order and drawings_pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0063E01E LoadLibraryA,GetProcAddress,0_2_0063E01E
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_006A2409 push 00000000h; iretd 0_2_006A240B
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_006A2410 push 00000000h; retf 0_2_006A2413
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0063288B push 66006323h; retn 0069h0_2_006328E1
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00646B05 push ecx; ret 0_2_00646B18
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_006AB9D8 push 00000000h; iretd 0_2_006AB9DA
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_006AB985 push 00000000h; ret 0_2_006AB98A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00930C55 push edi; retf 2_2_00930C7A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_05F5AEC0 push es; ret 2_2_05F5AED0
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00688111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00688111
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0063EB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0063EB42
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0064123A __initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0064123A
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeAPI/Special instruction interceptor: Address: CAC164
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599765Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599656Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599422Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599312Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599203Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598969Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598859Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598750Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598640Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598531Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598422Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598312Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598203Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598093Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597984Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597765Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597656Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597437Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597328Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597078Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596969Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596859Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596750Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596640Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596531Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596422Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596312Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596202Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596093Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595984Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595765Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595656Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595422Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595312Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595203Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594969Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594859Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594750Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594640Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594531Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2047Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7813Jump to behavior
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeEvaded block: after key decisiongraph_0-94385
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-95097
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeAPI coverage: 4.6 %
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00666CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00666CA9
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_006660DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_006660DD
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_006663F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_006663F9
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0066EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0066EB60
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0066F56F FindFirstFileW,FindClose,0_2_0066F56F
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0066F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0066F5FA
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00671B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00671B2F
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00671C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00671C8A
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00671F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00671F94
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0063DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0063DDC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599765Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599656Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599422Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599312Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599203Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598969Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598859Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598750Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598640Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598531Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598422Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598312Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598203Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598093Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597984Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597765Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597656Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597437Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597328Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597078Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596969Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596859Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596750Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596640Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596531Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596422Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596312Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596202Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596093Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595984Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595765Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595656Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595422Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595312Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595203Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594969Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594859Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594750Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594640Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594531Jump to behavior
                Source: RegSvcs.exe, 00000002.00000002.4528313972.0000000005840000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-94679
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-93380
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00676AAF BlockInput,0_2_00676AAF
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00623D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00623D19
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00653920 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,0_2_00653920
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0063E01E LoadLibraryA,GetProcAddress,0_2_0063E01E
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00CAC3D0 mov eax, dword ptr fs:[00000030h]0_2_00CAC3D0
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00CAC430 mov eax, dword ptr fs:[00000030h]0_2_00CAC430
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00CAADC0 mov eax, dword ptr fs:[00000030h]0_2_00CAADC0
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0065A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_0065A66C
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_006481AC SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006481AC
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00648189 SetUnhandledExceptionFilter,0_2_00648189
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 2AE008Jump to behavior
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0065B106 LogonUserW,0_2_0065B106
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00623D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00623D19
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0066411C SendInput,keybd_event,0_2_0066411C
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_006674E7 mouse_event,0_2_006674E7
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\order and drawings_pdf.exe"Jump to behavior
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0065A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_0065A66C
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_006671FA AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_006671FA
                Source: order and drawings_pdf.exeBinary or memory string: Shell_TrayWnd
                Source: order and drawings_pdf.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndTHISREMOVEblankinfoquestionstopwarning
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_006465C4 cpuid 0_2_006465C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0067091D GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW,0_2_0067091D
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0069B340 GetUserNameW,0_2_0069B340
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00651E8E __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00651E8E
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0063DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_0063DDC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5c0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.order and drawings_pdf.exe.3670000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.order and drawings_pdf.exe.3670000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2085096156.0000000003670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4522755984.000000000252C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4520282599.00000000005C2000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4522755984.0000000002501000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: order and drawings_pdf.exe PID: 7292, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7360, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: order and drawings_pdf.exeBinary or memory string: WIN_81
                Source: order and drawings_pdf.exeBinary or memory string: WIN_XP
                Source: order and drawings_pdf.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 12, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubytep
                Source: order and drawings_pdf.exeBinary or memory string: WIN_XPe
                Source: order and drawings_pdf.exeBinary or memory string: WIN_VISTA
                Source: order and drawings_pdf.exeBinary or memory string: WIN_7
                Source: order and drawings_pdf.exeBinary or memory string: WIN_8
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5c0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.order and drawings_pdf.exe.3670000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.order and drawings_pdf.exe.3670000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2085096156.0000000003670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4520282599.00000000005C2000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4522755984.0000000002501000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: order and drawings_pdf.exe PID: 7292, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7360, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5c0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.order and drawings_pdf.exe.3670000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.order and drawings_pdf.exe.3670000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2085096156.0000000003670000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4522755984.000000000252C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4520282599.00000000005C2000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4522755984.0000000002501000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: order and drawings_pdf.exe PID: 7292, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7360, type: MEMORYSTR
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_00678C4F socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00678C4F
                Source: C:\Users\user\Desktop\order and drawings_pdf.exeCode function: 0_2_0067923B socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_0067923B
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                121
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                11
                Disable or Modify Tools
                2
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                2
                Ingress Tool Transfer
                1
                Exfiltration Over Alternative Protocol
                1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts3
                Native API
                2
                Valid Accounts
                1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                221
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol2
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                Valid Accounts
                2
                Obfuscated Files or Information
                1
                Credentials in Registry
                2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                Access Token Manipulation
                1
                DLL Side-Loading
                NTDS138
                System Information Discovery
                Distributed Component Object Model221
                Input Capture
                2
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                Process Injection
                2
                Valid Accounts
                LSA Secrets241
                Security Software Discovery
                SSH4
                Clipboard Data
                23
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts121
                Virtualization/Sandbox Evasion
                Cached Domain Credentials121
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                Access Token Manipulation
                DCSync2
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                Process Injection
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                System Network Configuration Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                order and drawings_pdf.exe53%ReversingLabsWin32.Trojan.AutoitInject
                order and drawings_pdf.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                api.ipify.org
                104.26.12.205
                truefalse
                  high
                  ftp.gizemetiket.com.tr
                  93.89.225.40
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    https://api.ipify.org/false
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://api.ipify.orgorder and drawings_pdf.exe, 00000000.00000002.2085096156.0000000003670000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4520282599.00000000005C2000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4522755984.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://account.dyn.com/order and drawings_pdf.exe, 00000000.00000002.2085096156.0000000003670000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4520282599.00000000005C2000.00000040.80000000.00040000.00000000.sdmpfalse
                          high
                          https://api.ipify.org/tRegSvcs.exe, 00000002.00000002.4522755984.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.4522755984.00000000024B1000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://ftp.gizemetiket.com.trRegSvcs.exe, 00000002.00000002.4522755984.00000000026C8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4522755984.000000000257C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4522755984.000000000252C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4522755984.000000000280C000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                104.26.12.205
                                api.ipify.orgUnited States
                                13335CLOUDFLARENETUSfalse
                                93.89.225.40
                                ftp.gizemetiket.com.trTurkey
                                51557TR-FBSTRfalse
                                Joe Sandbox version:41.0.0 Charoite
                                Analysis ID:1559214
                                Start date and time:2024-11-20 10:14:08 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 8m 29s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:5
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:order and drawings_pdf.exe
                                Detection:MAL
                                Classification:mal100.troj.spyw.evad.winEXE@3/2@2/2
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 59
                                • Number of non-executed functions: 289
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                • VT rate limit hit for: order and drawings_pdf.exe
                                TimeTypeDescription
                                04:15:05API Interceptor10835025x Sleep call for process: RegSvcs.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                104.26.12.205Ransomware Mallox.exeGet hashmaliciousTargeted RansomwareBrowse
                                • api.ipify.org/
                                Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                                • api.ipify.org/
                                6706e721f2c06.exeGet hashmaliciousRemcosBrowse
                                • api.ipify.org/
                                perfcc.elfGet hashmaliciousXmrigBrowse
                                • api.ipify.org/
                                SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
                                • api.ipify.org/
                                SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
                                • api.ipify.org/
                                hloRQZmlfg.exeGet hashmaliciousRDPWrap ToolBrowse
                                • api.ipify.org/
                                file.exeGet hashmaliciousRDPWrap ToolBrowse
                                • api.ipify.org/
                                file.exeGet hashmaliciousUnknownBrowse
                                • api.ipify.org/
                                file.exeGet hashmaliciousUnknownBrowse
                                • api.ipify.org/
                                93.89.225.40Factura de proforma.exeGet hashmaliciousAgentTeslaBrowse
                                  Pago por adelantado_ USD 72000 (50%).exeGet hashmaliciousAgentTeslaBrowse
                                    pago de PEDIDO PROFORMA.exeGet hashmaliciousAgentTeslaBrowse
                                      Copia pendiente de pago Proveedor 107924.exeGet hashmaliciousAgentTeslaBrowse
                                        NUOVO PO 72968.exeGet hashmaliciousAgentTeslaBrowse
                                          Copia de pago de la Orden de compra OI16014 y OI16015.exeGet hashmaliciousAgentTeslaBrowse
                                            Ordine d'acquisto OI16014 e OI1601.exeGet hashmaliciousAgentTeslaBrowse
                                              #Uad6c#Ub9e4 #Uc8fc#Ubb38 658749 #Ubc0f 658752..exeGet hashmaliciousAgentTeslaBrowse
                                                Orden de compra 516-57406.exeGet hashmaliciousAgentTeslaBrowse
                                                  P0 n.#U00b0 1037596.exeGet hashmaliciousAgentTeslaBrowse
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    ftp.gizemetiket.com.trFactura de proforma.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 93.89.225.40
                                                    Pago por adelantado_ USD 72000 (50%).exeGet hashmaliciousAgentTeslaBrowse
                                                    • 93.89.225.40
                                                    pago de PEDIDO PROFORMA.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 93.89.225.40
                                                    Copia pendiente de pago Proveedor 107924.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 93.89.225.40
                                                    NUOVO PO 72968.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 93.89.225.40
                                                    Copia de pago de la Orden de compra OI16014 y OI16015.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 93.89.225.40
                                                    Ordine d'acquisto OI16014 e OI1601.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 93.89.225.40
                                                    #Uad6c#Ub9e4 #Uc8fc#Ubb38 658749 #Ubc0f 658752..exeGet hashmaliciousAgentTeslaBrowse
                                                    • 93.89.225.40
                                                    Orden de compra 516-57406.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 93.89.225.40
                                                    P0 n.#U00b0 1037596.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 93.89.225.40
                                                    api.ipify.orgvessel details_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 104.26.12.205
                                                    MV BUSAN STAR - calling to discharge about 55,000Mt of aggregates.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 104.26.13.205
                                                    QuarantineMessage.zipGet hashmaliciousUnknownBrowse
                                                    • 172.67.74.152
                                                    https://hmjpvx0wn1.gaimensebb.shop/Get hashmaliciousEvilProxy, HTMLPhisherBrowse
                                                    • 104.26.13.205
                                                    MVV ALIADO - S-REQ-19-00064 40ft 1x20.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                    • 172.67.74.152
                                                    Quotation.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 104.26.13.205
                                                    DOCS.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 172.67.74.152
                                                    1Sj5F6P4nv.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                    • 104.26.12.205
                                                    5LEXIucyEP.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                    • 172.67.74.152
                                                    44qLDKzsfO.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                    • 104.26.12.205
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    CLOUDFLARENETUSFACTURA A00072-24.- TPC CORPORATE EVENTS SL - PILAR FORGA.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                    • 188.114.96.3
                                                    114117914 - Rebound Electronics.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 188.114.97.3
                                                    #U5ba2#U6237#U9000#U6b3e#U7533#U8bf7#U8868-SUPERLEON NOVIEMBR.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                    • 188.114.96.3
                                                    BOQ and Full Specification.exeGet hashmaliciousGuLoaderBrowse
                                                    • 188.114.96.3
                                                    file.exeGet hashmaliciousLummaCBrowse
                                                    • 188.114.97.3
                                                    Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 188.114.96.3
                                                    https://2kio0wi0iat.freewebhostmost.comGet hashmaliciousHTMLPhisherBrowse
                                                    • 104.18.11.207
                                                    A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                    • 188.114.96.3
                                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, StealcBrowse
                                                    • 188.114.97.3
                                                    file.exeGet hashmaliciousLummaCBrowse
                                                    • 188.114.97.3
                                                    TR-FBSTRFactura de proforma.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 93.89.225.40
                                                    Pago por adelantado_ USD 72000 (50%).exeGet hashmaliciousAgentTeslaBrowse
                                                    • 93.89.225.40
                                                    pago de PEDIDO PROFORMA.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 93.89.225.40
                                                    Copia pendiente de pago Proveedor 107924.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 93.89.225.40
                                                    NUOVO PO 72968.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 93.89.225.40
                                                    Copia de pago de la Orden de compra OI16014 y OI16015.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 93.89.225.40
                                                    Ordine d'acquisto OI16014 e OI1601.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 93.89.225.40
                                                    #Uad6c#Ub9e4 #Uc8fc#Ubb38 658749 #Ubc0f 658752..exeGet hashmaliciousAgentTeslaBrowse
                                                    • 93.89.225.40
                                                    http://instagramlogin.com.tr/Get hashmaliciousUnknownBrowse
                                                    • 93.89.226.17
                                                    Orden de compra 516-57406.exeGet hashmaliciousAgentTeslaBrowse
                                                    • 93.89.225.40
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    3b5074b1b5d032e5620f69f9f700ff0eFACTURA A00072-24.- TPC CORPORATE EVENTS SL - PILAR FORGA.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                    • 104.26.12.205
                                                    114117914 - Rebound Electronics.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 104.26.12.205
                                                    #U5ba2#U6237#U9000#U6b3e#U7533#U8bf7#U8868-SUPERLEON NOVIEMBR.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                    • 104.26.12.205
                                                    BOQ and Full Specification.exeGet hashmaliciousGuLoaderBrowse
                                                    • 104.26.12.205
                                                    Request for Quotation MK FMHS.RFQ.24.11.20.bat.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    • 104.26.12.205
                                                    sostener.vbsGet hashmaliciousRemcosBrowse
                                                    • 104.26.12.205
                                                    file.exeGet hashmaliciousLummaCBrowse
                                                    • 104.26.12.205
                                                    seethebestthingswithgreatsituationshandletotheprogress.htaGet hashmaliciousCobalt Strike, AgentTesla, HTMLPhisherBrowse
                                                    • 104.26.12.205
                                                    Quote specification and BOQ.exeGet hashmaliciousGuLoaderBrowse
                                                    • 104.26.12.205
                                                    QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                    • 104.26.12.205
                                                    No context
                                                    Process:C:\Users\user\Desktop\order and drawings_pdf.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):142822
                                                    Entropy (8bit):7.7509512082493
                                                    Encrypted:false
                                                    SSDEEP:3072:zkJ8WyZF4iMaM2hBgstc9S4VMLPk25IPByB8l:AkZF4FStcHKPk254yBO
                                                    MD5:346446977B1BE469E175A27BEAA56751
                                                    SHA1:924F59E4E852E3A33ED0F180CB2D94958D8CF749
                                                    SHA-256:C58B0DBF568F1966D8484F5E9D74058815F9BB01460EF49BC0FEF93F60EF2AE9
                                                    SHA-512:65943C7CF815FE44A4F606998297338583AF6AB27CDC227B21B205DCED511AD760F591079EE01CE8A7E466959F8325F76C0525968F45035110892E65E36225CD
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:EA06.....E..I..sH..+.^W".T..&.I...y..&.z.R..!.......)u<m*c..ac...g...O%....Y.N.....Y.N.6..#D.I.2...x..%.:..?;.P......f.K..uH.X2....tf.L.S..uu........U.....d..@..'6@..kZ.P@$3=....1..Pbo7.th..=.c&..i.Y.........~.J%..A.V.9.....Q'. .P....@O@.;1../.....'.....1..h.`...[...=.......mR../...... R...D.....0...{9.U+UJH.... (...N....]f..............._.qx.Z&.18.N.....R.....3X.g..,u..q...y.....l$....S..?s>.n.7......c.Q*.s...z.p...k0..s...n.@...ov[...T..&Gj..R...)...d7[.+...;......W.>......E7=.=.M.@5.J..&..U.5&I\.B.:..{..sh...ci...0}...i|.G&.j.6. ...\..O.f..l-.....`.p....`_......+..).....s.. .....@.........A...Z..6S....!C4.........|[.....R3Rhu^.........<..is.......4..7..u...:.Z....)S:..c=..o5h./............B6...#......@..8............c6..7 .....r(....l.Nf....A*.Qd4*.V}\.D 6.=.I7...p1E.U.3..p.A.."5.......!.J-#.Q.0)Th.b.1...1...%5.Q+.....*.S&..eP...\(.Y.B.G.LmS...w..V*t....f..T....z..R...;...4....4..h[.l.u0.\...%b...T(.0..A........t..&.Kp../.Vo.yE:.g.M.Rk
                                                    Process:C:\Users\user\Desktop\order and drawings_pdf.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):239104
                                                    Entropy (8bit):6.547601133334871
                                                    Encrypted:false
                                                    SSDEEP:6144:XfVfnz3jhvnRkIZ5AE/V36YYI/wEJdYQ7ZTL8SJ:XNfz35nRUE/V5JV/N
                                                    MD5:FB4BF2907425C46297C2605C742E7B06
                                                    SHA1:0F11CBB774834A1C06121AFFC57E072DCAB03227
                                                    SHA-256:625FFA60FFC8D2E295D795B1BEF7F0039F9338CD0BA7AA65A069F29229FAB107
                                                    SHA-512:67848390BF09E9F1C61A6B8C140B219A7853C4BDCFB28DD828CF8FF5EB1DF4FA9BC42E6CC0AC5BBB03C1EB2F07C697F68AAE77713D1D91CB4B1576DE2D973D1F
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:...D269H=DXU..ZT.L7D169HyDXU57ZTEL7D169H9DXU57ZTEL7D169H9DXU.7ZTKS.J1.0...Y....<,?.4CY^:X)x6TY4;1lU!.DL&.-6uqx.t(#S!.;4B.DXU57ZT..7D}7:H.`.057ZTEL7D.6;I2ESU5.YTED7D169HW.[U5.ZTE.4D16yH9dXU55ZTAL7D169H=DXU57ZTEL3D149H9DXU77..EL'D1&9H9DHU5'ZTEL7D!69H9DXU57ZTQ.4Df69H9.[Us2ZTEL7D169H9DXU57ZTE.4D=69H9DXU57ZTEL7D169H9DXU57ZTEL7D169H9DXU57ZTEL7D169H9dXU=7ZTEL7D169H1dXU}7ZTEL7D169H.0=-A7ZT1.4D1.9H9.[U55ZTEL7D169H9DXU.7Z4k>D6R69H.AXU5.YTEJ7D1.:H9DXU57ZTEL7Dq69..6=9ZTZTIL7D1.:H9FXU5.YTEL7D169H9DXUu7Z.EL7D169H9DXU57ZT..4D169HqDXU77_T..5D..8H:DXU47ZREL7D169H9DXU57ZTEL7D169H9DXU57ZTEL7D169H9DXU57ZTX....qvq9f_W0.r.+.G.*.=..:vO.>X..zp4......B\..L.K....0....B.\@56.....$S$;_.#jCV.,....yy!u|.R+.M...Gz.*^q.....j....uGM....C..&#ZjPFI$\j.4SV(=.N.E169H.......,4|..56V.V .....q^O....GDXUQ7ZT7L7DP69H~DXUZ7ZT+L7DO69HGDXUs7ZT.L7D.69H.DXUX7ZTaL7DO69H.9WZ...=6..D169H...e.Z.....s...~H.&.W....(...l<..K0.Bt....9..]u...3S.y.SDJ3A31=K5yV...uGH3A31=K5yV...u.j......H..fM.(EL7D16.H9.XU5..T.L7D.6.H..XU5..T.L.D...H
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Entropy (8bit):6.970462540382765
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:order and drawings_pdf.exe
                                                    File size:1'075'200 bytes
                                                    MD5:4726039e5f4d03f6f3f9cc0cd8d423a1
                                                    SHA1:3dc80b737f67481eb0385b2a25058309c7a63989
                                                    SHA256:9970fc1f94630a822d109fd53bcb3fe1ed51bd5359007e3e4f570c0f85f3a040
                                                    SHA512:69487f9904d791cfe64cfeb6f7707032a843858eae747fcec5b3ca88286ce2de43e8324a9c85482c1d9353f7509ef749e7dc68775335f940e2178d8094218dd5
                                                    SSDEEP:24576:6tb20pkaCqT5TBWgNQ7a7Na6KD3176FE6A:nVg5tQ7a7NatDZ6C5
                                                    TLSH:BA35CF1363DE8365C3B25273BA25B701BEBF782506A5F96B2FD4093DE920122521E773
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d..............'.a.....H.k.....H.h.....H.i......}%......}5...............~.......k.......o.......1.......j.....Rich...........
                                                    Icon Hash:aaf3e3e3938382a0
                                                    Entrypoint:0x425f74
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x673CBD3F [Tue Nov 19 16:30:55 2024 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:5
                                                    OS Version Minor:1
                                                    File Version Major:5
                                                    File Version Minor:1
                                                    Subsystem Version Major:5
                                                    Subsystem Version Minor:1
                                                    Import Hash:3d95adbf13bbe79dc24dccb401c12091
                                                    Instruction
                                                    call 00007FBCE543700Fh
                                                    jmp 00007FBCE542A024h
                                                    int3
                                                    int3
                                                    push edi
                                                    push esi
                                                    mov esi, dword ptr [esp+10h]
                                                    mov ecx, dword ptr [esp+14h]
                                                    mov edi, dword ptr [esp+0Ch]
                                                    mov eax, ecx
                                                    mov edx, ecx
                                                    add eax, esi
                                                    cmp edi, esi
                                                    jbe 00007FBCE542A1AAh
                                                    cmp edi, eax
                                                    jc 00007FBCE542A50Eh
                                                    bt dword ptr [004C0158h], 01h
                                                    jnc 00007FBCE542A1A9h
                                                    rep movsb
                                                    jmp 00007FBCE542A4BCh
                                                    cmp ecx, 00000080h
                                                    jc 00007FBCE542A374h
                                                    mov eax, edi
                                                    xor eax, esi
                                                    test eax, 0000000Fh
                                                    jne 00007FBCE542A1B0h
                                                    bt dword ptr [004BA370h], 01h
                                                    jc 00007FBCE542A680h
                                                    bt dword ptr [004C0158h], 00000000h
                                                    jnc 00007FBCE542A34Dh
                                                    test edi, 00000003h
                                                    jne 00007FBCE542A35Eh
                                                    test esi, 00000003h
                                                    jne 00007FBCE542A33Dh
                                                    bt edi, 02h
                                                    jnc 00007FBCE542A1AFh
                                                    mov eax, dword ptr [esi]
                                                    sub ecx, 04h
                                                    lea esi, dword ptr [esi+04h]
                                                    mov dword ptr [edi], eax
                                                    lea edi, dword ptr [edi+04h]
                                                    bt edi, 03h
                                                    jnc 00007FBCE542A1B3h
                                                    movq xmm1, qword ptr [esi]
                                                    sub ecx, 08h
                                                    lea esi, dword ptr [esi+08h]
                                                    movq qword ptr [edi], xmm1
                                                    lea edi, dword ptr [edi+08h]
                                                    test esi, 00000007h
                                                    je 00007FBCE542A205h
                                                    bt esi, 03h
                                                    jnc 00007FBCE542A258h
                                                    movdqa xmm1, dqword ptr [esi+00h]
                                                    Programming Language:
                                                    • [ C ] VS2008 SP1 build 30729
                                                    • [IMP] VS2008 SP1 build 30729
                                                    • [ASM] VS2012 UPD4 build 61030
                                                    • [RES] VS2012 UPD4 build 61030
                                                    • [LNK] VS2012 UPD4 build 61030
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xb70040x17c.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x3d748.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1020000x6c4c.reloc
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x8d8d00x1c.rdata
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb27300x40.rdata
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x8d0000x860.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x8b54f0x8b600f437a6545e938612764dbb0a314376fcFalse0.5699499019058296data6.680413749210956IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0x8d0000x2cc420x2ce00827ffd24759e8e420890ecf164be989eFalse0.330464397632312data5.770192333189168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0xba0000x9d540x6200e0a519f8e3a35fae0d9c2cfd5a4bacfcFalse0.16402264030612246data2.002691099965349IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rsrc0xc40000x3d7480x3d800d975d31db446e8a612f2957296f2eb81False0.8933284108231707data7.810497667703815IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0x1020000xa4740xa6000bc98f8631ef0bde830a7f83bb06ff08False0.5017884036144579data5.245426654116355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_ICON0xc45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                    RT_ICON0xc46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                    RT_ICON0xc47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                    RT_ICON0xc49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                    RT_ICON0xc4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                    RT_ICON0xc4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                    RT_ICON0xc5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                    RT_ICON0xc64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                    RT_ICON0xc69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                    RT_ICON0xc8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                    RT_ICON0xca0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                    RT_MENU0xca4a00x50dataEnglishGreat Britain0.9
                                                    RT_STRING0xca4f00x594dataEnglishGreat Britain0.3333333333333333
                                                    RT_STRING0xcaa840x68adataEnglishGreat Britain0.2747909199522103
                                                    RT_STRING0xcb1100x490dataEnglishGreat Britain0.3715753424657534
                                                    RT_STRING0xcb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                    RT_STRING0xcbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                    RT_STRING0xcc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                    RT_STRING0xcc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                    RT_RCDATA0xcc7b80x34a4fdata1.0003524539607014
                                                    RT_GROUP_ICON0x1012080x76dataEnglishGreat Britain0.6610169491525424
                                                    RT_GROUP_ICON0x1012800x14dataEnglishGreat Britain1.25
                                                    RT_GROUP_ICON0x1012940x14dataEnglishGreat Britain1.15
                                                    RT_GROUP_ICON0x1012a80x14dataEnglishGreat Britain1.25
                                                    RT_VERSION0x1012bc0xdcdataEnglishGreat Britain0.6181818181818182
                                                    RT_MANIFEST0x1013980x3b0ASCII text, with CRLF line terminatorsEnglishGreat Britain0.5116525423728814
                                                    DLLImport
                                                    WSOCK32.dll__WSAFDIsSet, recv, send, setsockopt, ntohs, recvfrom, select, WSAStartup, htons, accept, listen, bind, closesocket, connect, WSACleanup, ioctlsocket, sendto, WSAGetLastError, inet_addr, gethostbyname, gethostname, socket
                                                    VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                    COMCTL32.dllImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_Create, InitCommonControlsEx, ImageList_ReplaceIcon
                                                    MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                    WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetConnectW, InternetQueryDataAvailable
                                                    PSAPI.DLLGetProcessMemoryInfo
                                                    IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                    USERENV.dllUnloadUserProfile, DestroyEnvironmentBlock, CreateEnvironmentBlock, LoadUserProfileW
                                                    UxTheme.dllIsThemeActive
                                                    KERNEL32.dllHeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetCurrentThread, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, DeleteCriticalSection, WaitForSingleObject, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, CloseHandle, GetLastError, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, RaiseException, InitializeCriticalSectionAndSpinCount, InterlockedDecrement, InterlockedIncrement, CreateThread, DuplicateHandle, EnterCriticalSection, GetCurrentProcess, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, HeapSize, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, SetFilePointer, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, HeapReAlloc, WriteConsoleW, SetEndOfFile, DeleteFileW, SetEnvironmentVariableA
                                                    USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, DrawMenuBar, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, MonitorFromRect, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, CopyImage, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, UnregisterHotKey, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, DeleteMenu, PeekMessageW, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, CharLowerBuffW, GetWindowTextW
                                                    GDI32.dllSetPixel, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, GetDeviceCaps, CloseFigure, LineTo, AngleArc, CreateCompatibleBitmap, CreateCompatibleDC, MoveToEx, Ellipse, PolyDraw, BeginPath, SelectObject, StretchBlt, GetDIBits, DeleteDC, GetPixel, CreateDCW, GetStockObject, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, EndPath
                                                    COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                    ADVAPI32.dllGetAclInformation, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, InitiateSystemShutdownExW, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, SetSecurityDescriptorDacl, AddAce, GetAce
                                                    SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                    ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                    OLEAUT32.dllRegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, UnRegisterTypeLib, SafeArrayCreateVector, SysAllocString, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, QueryPathOfRegTypeLib, VariantCopy, VariantClear, CreateDispTypeInfo, CreateStdDispatch, DispCallFunc, VariantChangeType, SafeArrayAllocDescriptorEx, VariantInit
                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishGreat Britain
                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                    2024-11-20T10:15:08.237196+01002029927ET MALWARE AgentTesla Exfil via FTP1192.168.2.54970593.89.225.4021TCP
                                                    2024-11-20T10:15:08.466736+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.54970693.89.225.4054896TCP
                                                    2024-11-20T10:15:08.742494+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.54970693.89.225.4054896TCP
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Nov 20, 2024 10:15:04.938627005 CET49704443192.168.2.5104.26.12.205
                                                    Nov 20, 2024 10:15:04.938680887 CET44349704104.26.12.205192.168.2.5
                                                    Nov 20, 2024 10:15:04.938760996 CET49704443192.168.2.5104.26.12.205
                                                    Nov 20, 2024 10:15:04.945671082 CET49704443192.168.2.5104.26.12.205
                                                    Nov 20, 2024 10:15:04.945687056 CET44349704104.26.12.205192.168.2.5
                                                    Nov 20, 2024 10:15:05.415333033 CET44349704104.26.12.205192.168.2.5
                                                    Nov 20, 2024 10:15:05.415497065 CET49704443192.168.2.5104.26.12.205
                                                    Nov 20, 2024 10:15:05.419845104 CET49704443192.168.2.5104.26.12.205
                                                    Nov 20, 2024 10:15:05.419859886 CET44349704104.26.12.205192.168.2.5
                                                    Nov 20, 2024 10:15:05.420106888 CET44349704104.26.12.205192.168.2.5
                                                    Nov 20, 2024 10:15:05.469369888 CET49704443192.168.2.5104.26.12.205
                                                    Nov 20, 2024 10:15:05.515347958 CET44349704104.26.12.205192.168.2.5
                                                    Nov 20, 2024 10:15:05.584388971 CET44349704104.26.12.205192.168.2.5
                                                    Nov 20, 2024 10:15:05.584450006 CET44349704104.26.12.205192.168.2.5
                                                    Nov 20, 2024 10:15:05.584559917 CET49704443192.168.2.5104.26.12.205
                                                    Nov 20, 2024 10:15:05.601213932 CET49704443192.168.2.5104.26.12.205
                                                    Nov 20, 2024 10:15:06.227663040 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:15:06.232955933 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:15:06.233023882 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:15:06.856956959 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:15:06.857132912 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:15:06.862185955 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:15:07.081981897 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:15:07.082401037 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:15:07.090466976 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:15:07.314343929 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:15:07.318573952 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:15:07.323523045 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:15:07.543824911 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:15:07.544014931 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:15:07.548942089 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:15:07.769329071 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:15:07.769483089 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:15:07.774446964 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:15:07.994916916 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:15:08.001636028 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:15:08.007831097 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:15:08.229212046 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:15:08.229880095 CET4970654896192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:15:08.236967087 CET548964970693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:15:08.237086058 CET4970654896192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:15:08.237195969 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:15:08.243990898 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:15:08.466402054 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:15:08.466736078 CET4970654896192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:15:08.466787100 CET4970654896192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:15:08.474000931 CET548964970693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:15:08.518326044 CET548964970693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:15:08.518371105 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:15:08.742387056 CET548964970693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:15:08.742494106 CET4970654896192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:15:08.959321022 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:15:09.002702951 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:35.139022112 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:35.143923044 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.366066933 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.367180109 CET4998055008192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:35.374110937 CET550084998093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.374205112 CET4998055008192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:35.374452114 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:35.381350994 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.397037983 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:35.401959896 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.402028084 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:35.601277113 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.601604939 CET4998055008192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:35.606671095 CET550084998093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.606676102 CET550084998093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.606687069 CET550084998093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.606690884 CET550084998093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.606708050 CET550084998093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.606719017 CET550084998093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.606719971 CET550084998093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.606766939 CET4998055008192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:35.606877089 CET550084998093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.606882095 CET550084998093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.606892109 CET550084998093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.606940031 CET4998055008192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:35.606966019 CET4998055008192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:35.611740112 CET550084998093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.611743927 CET550084998093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.611752987 CET550084998093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.611804008 CET550084998093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.611808062 CET550084998093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.611815929 CET4998055008192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:35.611818075 CET550084998093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.611871958 CET4998055008192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:35.612006903 CET550084998093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.612097025 CET4998055008192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:35.643294096 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:35.653630972 CET550084998093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.876857996 CET550084998093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:35.876966953 CET4998055008192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:36.050051928 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:36.050508022 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:36.057744980 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:36.283488989 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:36.286549091 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:36.291568995 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:36.365796089 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:36.411335945 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:36.519428968 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:36.522619963 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:36.527544022 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:36.752979040 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:36.753911018 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:36.758858919 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:36.984383106 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:36.986530066 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:36.993896008 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.219266891 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.219428062 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:37.227677107 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.453318119 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.454122066 CET4998255010192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:37.459068060 CET550104998293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.459204912 CET4998255010192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:37.459336042 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:37.464299917 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.706307888 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.706592083 CET4998255010192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:37.715497971 CET550104998293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.715504885 CET550104998293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.715517998 CET550104998293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.715521097 CET550104998293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.715528965 CET550104998293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.715533018 CET550104998293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.715539932 CET550104998293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.715543032 CET550104998293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.715550900 CET550104998293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.715553999 CET550104998293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.715650082 CET4998255010192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:37.715687037 CET4998255010192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:37.723989010 CET550104998293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.724080086 CET550104998293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.724087954 CET550104998293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.724091053 CET550104998293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.724095106 CET550104998293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.724097967 CET550104998293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.724240065 CET4998255010192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:37.752825022 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:37.761295080 CET550104998293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.761486053 CET4998255010192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:37.809303045 CET550104998293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.948292971 CET550104998293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:37.950166941 CET4998255010192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:38.445390940 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:38.487085104 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:44.914827108 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:44.919748068 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.147133112 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.147830963 CET4998355020192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:45.154382944 CET550204998393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.154480934 CET4998355020192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:45.154583931 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:45.160911083 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.386816025 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.387131929 CET4998355020192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:45.392136097 CET550204998393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.392147064 CET550204998393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.392158031 CET550204998393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.392177105 CET550204998393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.392185926 CET550204998393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.392204046 CET550204998393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.392213106 CET550204998393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.392211914 CET4998355020192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:45.392260075 CET550204998393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.392268896 CET550204998393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.392270088 CET4998355020192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:45.392276049 CET550204998393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.392333984 CET4998355020192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:45.398705006 CET550204998393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.398765087 CET4998355020192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:45.398852110 CET550204998393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.398863077 CET550204998393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.398905039 CET4998355020192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:45.398958921 CET550204998393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.398967028 CET550204998393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.398974895 CET550204998393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.398983002 CET550204998393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.399008036 CET4998355020192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:45.399036884 CET4998355020192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:45.440167904 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:45.441355944 CET550204998393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.441448927 CET4998355020192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:45.471424103 CET4998355020192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:45.489272118 CET550204998393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.648614883 CET550204998393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:45.648756027 CET4998355020192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:46.146773100 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:46.190475941 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:49.313287973 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:49.320528030 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:49.544090986 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:49.544809103 CET4998455021192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:49.550259113 CET550214998493.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:49.550343990 CET4998455021192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:49.550401926 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:49.556070089 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:49.786403894 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:49.786690950 CET4998455021192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:49.794300079 CET550214998493.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:49.794317961 CET550214998493.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:49.794346094 CET550214998493.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:49.794390917 CET4998455021192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:49.794425011 CET550214998493.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:49.794497967 CET4998455021192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:49.794565916 CET550214998493.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:49.794579983 CET550214998493.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:49.794591904 CET550214998493.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:49.794648886 CET4998455021192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:49.794790983 CET550214998493.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:49.794848919 CET4998455021192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:49.795372009 CET550214998493.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:49.795387030 CET550214998493.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:49.795423031 CET4998455021192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:49.795439959 CET4998455021192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:49.802054882 CET550214998493.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:49.802068949 CET550214998493.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:49.802095890 CET550214998493.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:49.802126884 CET4998455021192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:49.802141905 CET4998455021192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:49.802200079 CET550214998493.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:49.802212000 CET550214998493.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:49.802244902 CET550214998493.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:49.802263975 CET4998455021192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:49.802282095 CET4998455021192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:49.845567942 CET550214998493.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:49.845695972 CET4998455021192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:49.893855095 CET550214998493.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:49.955794096 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:50.041275978 CET550214998493.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:50.042467117 CET4998455021192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:50.530503035 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:50.752697945 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:55.192668915 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:55.197654963 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.425874949 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.435658932 CET4998555022192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:55.441406965 CET550224998593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.441478968 CET4998555022192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:55.443665981 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:55.448520899 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.675939083 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.676208973 CET4998555022192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:55.681135893 CET550224998593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.681149006 CET550224998593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.681166887 CET550224998593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.681176901 CET550224998593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.681204081 CET4998555022192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:55.681216955 CET550224998593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.681226015 CET550224998593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.681233883 CET550224998593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.681247950 CET4998555022192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:55.681272030 CET4998555022192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:55.681279898 CET550224998593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.681282997 CET4998555022192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:55.681288958 CET550224998593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.681324005 CET550224998593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.681324959 CET4998555022192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:55.681372881 CET4998555022192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:55.686068058 CET550224998593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.686115980 CET4998555022192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:55.686150074 CET550224998593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.686160088 CET550224998593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.686167955 CET550224998593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.686182976 CET4998555022192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:55.686194897 CET550224998593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.686197042 CET4998555022192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:55.686203957 CET550224998593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.686223984 CET4998555022192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:55.686249971 CET4998555022192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:55.729288101 CET550224998593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.729361057 CET4998555022192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:55.768286943 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:55.780313015 CET550224998593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.930115938 CET550224998593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:55.930176973 CET4998555022192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:16:56.425601006 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:16:56.565171003 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:21.747493029 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:21.825867891 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.058557987 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.059145927 CET4998655032192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:22.071542978 CET550324998693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.071631908 CET4998655032192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:22.071757078 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:22.089751959 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.319741011 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.322630882 CET4998655032192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:22.332272053 CET550324998693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.332459927 CET550324998693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.332468033 CET550324998693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.332478046 CET550324998693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.332480907 CET550324998693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.332645893 CET4998655032192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:22.335256100 CET550324998693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.335261106 CET550324998693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.335270882 CET550324998693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.335274935 CET550324998693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.335390091 CET4998655032192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:22.337779045 CET550324998693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.340775967 CET4998655032192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:22.343259096 CET550324998693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.343262911 CET550324998693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.343272924 CET550324998693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.343276978 CET550324998693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.343291044 CET550324998693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.343395948 CET4998655032192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:22.343480110 CET4998655032192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:22.349796057 CET550324998693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.350099087 CET4998655032192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:22.377680063 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:22.394037962 CET550324998693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.396575928 CET4998655032192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:22.445278883 CET550324998693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.604640961 CET550324998693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:22.604978085 CET4998655032192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:23.098596096 CET214998193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:23.143348932 CET4998121192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:32.669445992 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:32.676280022 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:32.681189060 CET4998721192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:32.687846899 CET214998793.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:32.688092947 CET4998721192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:32.693227053 CET4998721192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:32.702033043 CET214998793.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:32.702929974 CET4998721192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:32.901940107 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:32.902621031 CET4998855040192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:32.916876078 CET550404998893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:32.916977882 CET4998855040192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:32.917874098 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:32.933269024 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:33.155572891 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:33.155889988 CET4998855040192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:33.161403894 CET550404998893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:33.161438942 CET550404998893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:33.161452055 CET550404998893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:33.161456108 CET4998855040192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:33.161463976 CET550404998893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:33.161488056 CET550404998893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:33.161494017 CET4998855040192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:33.161500931 CET550404998893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:33.161511898 CET550404998893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:33.161524057 CET550404998893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:33.161525011 CET4998855040192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:33.161535025 CET550404998893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:33.161546946 CET550404998893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:33.161551952 CET4998855040192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:33.161578894 CET4998855040192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:33.161602020 CET4998855040192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:33.166934013 CET550404998893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:33.166943073 CET550404998893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:33.166954994 CET550404998893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:33.166965008 CET550404998893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:33.166974068 CET550404998893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:33.166977882 CET550404998893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:33.166984081 CET4998855040192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:33.167004108 CET4998855040192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:33.167036057 CET4998855040192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:33.216092110 CET550404998893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:33.216190100 CET4998855040192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:33.252655029 CET4998855040192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:33.259948969 CET550404998893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:33.286309958 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:33.429399014 CET550404998893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:33.429449081 CET4998855040192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:33.915132999 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:33.955420971 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:41.475311041 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:41.481257915 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:41.702193022 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:41.702717066 CET4998955044192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:41.709296942 CET550444998993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:41.709378958 CET4998955044192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:41.709525108 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:41.715811968 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:41.941881895 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:41.942301989 CET4998955044192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:41.952081919 CET550444998993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:41.952086926 CET550444998993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:41.952095985 CET550444998993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:41.952099085 CET550444998993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:41.952102900 CET550444998993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:41.952111006 CET550444998993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:41.952115059 CET550444998993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:41.952117920 CET550444998993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:41.952127934 CET550444998993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:41.952133894 CET550444998993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:41.952194929 CET4998955044192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:41.952284098 CET4998955044192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:41.960670948 CET550444998993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:41.960675955 CET550444998993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:41.960753918 CET4998955044192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:41.960813999 CET550444998993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:41.960818052 CET550444998993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:41.960829973 CET550444998993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:41.960834026 CET550444998993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:41.960916042 CET4998955044192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:41.987025023 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:42.003643036 CET550444998993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:42.003757000 CET4998955044192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:42.033929110 CET4998955044192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:42.057533026 CET550444998993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:42.225014925 CET550444998993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:42.225275040 CET4998955044192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:42.713195086 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:42.770421028 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:43.890831947 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:43.897989035 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.119640112 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.120223045 CET4999055045192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:44.127379894 CET550454999093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.127479076 CET4999055045192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:44.127636909 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:44.134337902 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.359286070 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.361689091 CET4999055045192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:44.367677927 CET550454999093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.367687941 CET550454999093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.367691040 CET550454999093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.367698908 CET550454999093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.367765903 CET550454999093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.367769003 CET550454999093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.367777109 CET550454999093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.367779970 CET550454999093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.367784977 CET550454999093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.367791891 CET550454999093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.367839098 CET4999055045192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:44.367882967 CET4999055045192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:44.373994112 CET550454999093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.373997927 CET550454999093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.374006987 CET550454999093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.374010086 CET550454999093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.374017954 CET550454999093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.374021053 CET550454999093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.374253035 CET4999055045192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:44.409492016 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:44.414796114 CET550454999093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.417108059 CET4999055045192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:44.466710091 CET550454999093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.622800112 CET550454999093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:44.625288010 CET4999055045192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:17:45.114805937 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:17:45.158895016 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:04.666551113 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:04.672132969 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:04.891493082 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:04.891979933 CET4999155054192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:04.896903038 CET550544999193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:04.896987915 CET4999155054192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:04.897196054 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:04.904032946 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:05.126276970 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:05.128921986 CET4999155054192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:05.136112928 CET550544999193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:05.136123896 CET550544999193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:05.136142015 CET550544999193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:05.136151075 CET550544999193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:05.136161089 CET550544999193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:05.136168957 CET550544999193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:05.136224031 CET4999155054192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:05.136225939 CET550544999193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:05.136234999 CET550544999193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:05.136243105 CET550544999193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:05.136253119 CET550544999193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:05.136262894 CET4999155054192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:05.136282921 CET4999155054192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:05.136348963 CET4999155054192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:05.141132116 CET550544999193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:05.141141891 CET550544999193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:05.141212940 CET550544999193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:05.141222000 CET550544999193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:05.141247034 CET4999155054192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:05.141262054 CET550544999193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:05.141271114 CET550544999193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:05.141284943 CET4999155054192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:05.141295910 CET4999155054192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:05.141398907 CET4999155054192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:05.174542904 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:05.186466932 CET550544999193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:05.186644077 CET4999155054192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:05.221407890 CET4999155054192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:05.227593899 CET550544999193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:05.399435043 CET550544999193.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:05.399507999 CET4999155054192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:05.889470100 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:05.940144062 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:12.274482965 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:12.326527119 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:12.548572063 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:12.550451040 CET4999255055192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:12.555696011 CET550554999293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:12.558549881 CET4999255055192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:12.558841944 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:12.564697027 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:12.787904978 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:12.788172007 CET4999255055192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:12.797308922 CET550554999293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:12.797321081 CET550554999293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:12.797331095 CET550554999293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:12.797462940 CET4999255055192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:12.797627926 CET550554999293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:12.797630072 CET550554999293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:12.797635078 CET550554999293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:12.797720909 CET4999255055192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:12.798830986 CET550554999293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:12.798842907 CET550554999293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:12.798851967 CET550554999293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:12.798865080 CET550554999293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:12.798942089 CET4999255055192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:12.804276943 CET550554999293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:12.804348946 CET550554999293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:12.804358959 CET550554999293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:12.804358959 CET4999255055192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:12.804436922 CET4999255055192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:12.804605961 CET550554999293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:12.804702997 CET4999255055192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:12.804982901 CET550554999293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:12.804992914 CET550554999293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:12.805077076 CET4999255055192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:12.845426083 CET550554999293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:12.845566034 CET4999255055192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:12.895853043 CET550554999293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:12.940200090 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:13.070147991 CET550554999293.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:13.070591927 CET4999255055192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:13.556902885 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:13.668579102 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:17.636178970 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:17.644984961 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:17.867103100 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:17.867722034 CET4999355059192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:17.872823954 CET550594999393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:17.872914076 CET4999355059192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:17.873076916 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:17.877969980 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.102406025 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.102682114 CET4999355059192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:18.110297918 CET550594999393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.110306978 CET550594999393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.110316992 CET550594999393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.110385895 CET4999355059192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:18.110433102 CET4999355059192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:18.110451937 CET550594999393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.110456944 CET550594999393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.110467911 CET550594999393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.110471964 CET550594999393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.110476971 CET550594999393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.110481024 CET550594999393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.110490084 CET550594999393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.110526085 CET4999355059192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:18.110544920 CET4999355059192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:18.110559940 CET4999355059192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:18.118042946 CET550594999393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.118175030 CET550594999393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.118247032 CET4999355059192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:18.118330956 CET550594999393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.118336916 CET550594999393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.118346930 CET550594999393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.118381023 CET4999355059192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:18.118413925 CET4999355059192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:18.118483067 CET550594999393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.118810892 CET4999355059192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:18.157285929 CET550594999393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.157362938 CET4999355059192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:18.190164089 CET4999355059192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:18.192203045 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:18.195108891 CET550594999393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.361335993 CET550594999393.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.362579107 CET4999355059192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:18.447041988 CET4999421192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:18.455445051 CET214999493.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.458606958 CET4999421192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:18.459304094 CET4999421192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:18.467540979 CET214999493.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.467621088 CET4999421192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:18.871360064 CET214970593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:18.942333937 CET4970521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:23.868132114 CET4999521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:23.873867989 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:23.874345064 CET4999521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:24.306581974 CET4999621192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:24.312939882 CET214999693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:24.313097954 CET4999621192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:24.313226938 CET4999621192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:24.325818062 CET214999693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:24.328491926 CET214999693.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:24.330099106 CET4999621192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:24.494493961 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:24.498591900 CET4999521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:24.503803015 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:24.727951050 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:24.728137970 CET4999521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:24.735479116 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:24.954366922 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:24.954602957 CET4999521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:24.959439039 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:25.181462049 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:25.181812048 CET4999521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:25.188375950 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:25.406637907 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:25.406896114 CET4999521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:25.411735058 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:25.631386042 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:25.634474039 CET4999521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:25.639337063 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:25.863360882 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:25.863905907 CET4999755064192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:25.868877888 CET550644999793.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:25.868947983 CET4999755064192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:25.869101048 CET4999521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:25.873908997 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:26.096225977 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:26.096565962 CET4999755064192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:26.101538897 CET550644999793.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:26.101547956 CET550644999793.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:26.101598978 CET550644999793.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:26.101612091 CET4999755064192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:26.101623058 CET4999755064192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:26.101629019 CET550644999793.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:26.101654053 CET4999755064192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:26.101660013 CET550644999793.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:26.101667881 CET550644999793.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:26.101676941 CET4999755064192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:26.101699114 CET4999755064192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:26.101710081 CET550644999793.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:26.101717949 CET4999755064192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:26.101727009 CET550644999793.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:26.101751089 CET4999755064192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:26.101779938 CET4999755064192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:26.101792097 CET550644999793.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:26.101799965 CET550644999793.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:26.101840973 CET4999755064192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:26.109615088 CET550644999793.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:26.109623909 CET550644999793.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:26.109632969 CET550644999793.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:26.109642029 CET550644999793.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:26.109651089 CET550644999793.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:26.109663010 CET550644999793.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:26.109699965 CET4999755064192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:26.109754086 CET4999755064192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:26.154077053 CET550644999793.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:26.154196024 CET4999755064192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:26.201417923 CET550644999793.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:26.237025976 CET4999521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:26.356271982 CET550644999793.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:26.356421947 CET4999755064192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:26.844835043 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:26.926454067 CET4999521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:29.010457039 CET4999521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:29.424500942 CET4999521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:29.673048973 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:29.673680067 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:29.893198013 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:29.893929005 CET4999855068192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:29.899643898 CET550684999893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:29.899735928 CET4999855068192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:29.899780989 CET4999521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:29.904690027 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:30.127130032 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:30.127372980 CET4999855068192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:30.133377075 CET550684999893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:30.133395910 CET550684999893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:30.133399963 CET550684999893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:30.133409023 CET550684999893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:30.133413076 CET550684999893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:30.133420944 CET550684999893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:30.133424044 CET550684999893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:30.133431911 CET550684999893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:30.133436918 CET550684999893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:30.133441925 CET4999855068192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:30.133445978 CET550684999893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:30.133507967 CET4999855068192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:30.139543056 CET550684999893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:30.139553070 CET550684999893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:30.139601946 CET4999855068192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:30.139627934 CET4999855068192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:30.139663935 CET550684999893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:30.139667988 CET550684999893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:30.139677048 CET550684999893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:30.139681101 CET550684999893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:30.139734030 CET4999855068192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:30.182981014 CET550684999893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:30.183065891 CET4999855068192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:30.235337973 CET550684999893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:30.237010956 CET4999521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:30.388814926 CET550684999893.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:30.392724991 CET4999855068192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:30.902210951 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:31.034461975 CET4999521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:34.762484074 CET4999521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:34.773540020 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:34.994328976 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:34.994913101 CET4999955069192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:35.002578974 CET550694999993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:35.002681017 CET4999955069192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:35.002804995 CET4999521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:35.009824038 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:35.232273102 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:35.232634068 CET4999955069192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:35.237709045 CET550694999993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:35.237751961 CET550694999993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:35.237761021 CET550694999993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:35.237823009 CET4999955069192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:35.238054991 CET550694999993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:35.238065004 CET550694999993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:35.238073111 CET550694999993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:35.238081932 CET550694999993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:35.238090992 CET550694999993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:35.238105059 CET550694999993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:35.238114119 CET550694999993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:35.238142014 CET4999955069192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:35.238229990 CET4999955069192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:35.243104935 CET550694999993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:35.243117094 CET550694999993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:35.243185043 CET4999955069192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:35.243204117 CET550694999993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:35.243212938 CET550694999993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:35.243261099 CET4999955069192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:35.243262053 CET550694999993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:35.243355989 CET4999955069192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:35.243438959 CET550694999993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:35.243515968 CET4999955069192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:35.283885956 CET4999521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:35.285284996 CET550694999993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:35.285398960 CET4999955069192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:35.341028929 CET550694999993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:35.502326012 CET550694999993.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:35.502403021 CET4999955069192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:18:36.050920963 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:18:36.096378088 CET4999521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:19:09.884000063 CET4999521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:19:09.891782045 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.112118959 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.113076925 CET5000055096192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:19:10.118552923 CET550965000093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.118788004 CET4999521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:19:10.119333982 CET5000055096192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:19:10.127721071 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.351357937 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.351586103 CET5000055096192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:19:10.356542110 CET550965000093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.356573105 CET550965000093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.356583118 CET550965000093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.356594086 CET550965000093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.356621027 CET5000055096192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:19:10.356642962 CET550965000093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.356652975 CET550965000093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.356658936 CET5000055096192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:19:10.356661081 CET550965000093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.356671095 CET550965000093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.356703043 CET5000055096192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:19:10.356719017 CET5000055096192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:19:10.356753111 CET550965000093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.356761932 CET550965000093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.356877089 CET5000055096192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:19:10.362200022 CET550965000093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.362215042 CET550965000093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.362224102 CET550965000093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.362237930 CET550965000093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.362257004 CET550965000093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.362279892 CET5000055096192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:19:10.362309933 CET5000055096192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:19:10.362355947 CET5000055096192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:19:10.362730026 CET550965000093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.364628077 CET5000055096192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:19:10.405796051 CET550965000093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.405881882 CET5000055096192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:19:10.453212023 CET550965000093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.471425056 CET4999521192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:19:10.618968010 CET550965000093.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:10.619334936 CET5000055096192.168.2.593.89.225.40
                                                    Nov 20, 2024 10:19:11.114491940 CET214999593.89.225.40192.168.2.5
                                                    Nov 20, 2024 10:19:11.158942938 CET4999521192.168.2.593.89.225.40
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Nov 20, 2024 10:15:04.924009085 CET5183753192.168.2.51.1.1.1
                                                    Nov 20, 2024 10:15:04.933147907 CET53518371.1.1.1192.168.2.5
                                                    Nov 20, 2024 10:15:06.130414963 CET5236653192.168.2.51.1.1.1
                                                    Nov 20, 2024 10:15:06.226985931 CET53523661.1.1.1192.168.2.5
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Nov 20, 2024 10:15:04.924009085 CET192.168.2.51.1.1.10x1be6Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                    Nov 20, 2024 10:15:06.130414963 CET192.168.2.51.1.1.10x1ff3Standard query (0)ftp.gizemetiket.com.trA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Nov 20, 2024 10:15:04.933147907 CET1.1.1.1192.168.2.50x1be6No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                    Nov 20, 2024 10:15:04.933147907 CET1.1.1.1192.168.2.50x1be6No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                    Nov 20, 2024 10:15:04.933147907 CET1.1.1.1192.168.2.50x1be6No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                    Nov 20, 2024 10:15:06.226985931 CET1.1.1.1192.168.2.50x1ff3No error (0)ftp.gizemetiket.com.tr93.89.225.40A (IP address)IN (0x0001)false
                                                    • api.ipify.org
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.549704104.26.12.2054437360C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-11-20 09:15:05 UTC155OUTGET / HTTP/1.1
                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                    Host: api.ipify.org
                                                    Connection: Keep-Alive
                                                    2024-11-20 09:15:05 UTC399INHTTP/1.1 200 OK
                                                    Date: Wed, 20 Nov 2024 09:15:05 GMT
                                                    Content-Type: text/plain
                                                    Content-Length: 11
                                                    Connection: close
                                                    Vary: Origin
                                                    CF-Cache-Status: DYNAMIC
                                                    Server: cloudflare
                                                    CF-RAY: 8e57555f894a437a-EWR
                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1631&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2820&recv_bytes=769&delivery_rate=1722713&cwnd=219&unsent_bytes=0&cid=23c3740f4a637d13&ts=175&x=0"
                                                    2024-11-20 09:15:05 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 37 35
                                                    Data Ascii: 8.46.123.75


                                                    TimestampSource PortDest PortSource IPDest IPCommands
                                                    Nov 20, 2024 10:15:06.856956959 CET214970593.89.225.40192.168.2.5220 Microsoft FTP Service
                                                    Nov 20, 2024 10:15:06.857132912 CET4970521192.168.2.593.89.225.40USER pgizemM6
                                                    Nov 20, 2024 10:15:07.081981897 CET214970593.89.225.40192.168.2.5331 Password required
                                                    Nov 20, 2024 10:15:07.082401037 CET4970521192.168.2.593.89.225.40PASS giz95Ffg
                                                    Nov 20, 2024 10:15:07.314343929 CET214970593.89.225.40192.168.2.5230 User logged in.
                                                    Nov 20, 2024 10:15:07.543824911 CET214970593.89.225.40192.168.2.5200 OPTS UTF8 command successful - UTF8 encoding now ON.
                                                    Nov 20, 2024 10:15:07.544014931 CET4970521192.168.2.593.89.225.40PWD
                                                    Nov 20, 2024 10:15:07.769329071 CET214970593.89.225.40192.168.2.5257 "/" is current directory.
                                                    Nov 20, 2024 10:15:07.769483089 CET4970521192.168.2.593.89.225.40TYPE I
                                                    Nov 20, 2024 10:15:07.994916916 CET214970593.89.225.40192.168.2.5200 Type set to I.
                                                    Nov 20, 2024 10:15:08.001636028 CET4970521192.168.2.593.89.225.40PASV
                                                    Nov 20, 2024 10:15:08.229212046 CET214970593.89.225.40192.168.2.5227 Entering Passive Mode (93,89,225,40,214,112).
                                                    Nov 20, 2024 10:15:08.237195969 CET4970521192.168.2.593.89.225.40STOR PW_user-609290_2024_11_20_04_15_05.html
                                                    Nov 20, 2024 10:15:08.466402054 CET214970593.89.225.40192.168.2.5150 Opening BINARY mode data connection.
                                                    Nov 20, 2024 10:15:08.959321022 CET214970593.89.225.40192.168.2.5226 Transfer complete.
                                                    Nov 20, 2024 10:16:35.139022112 CET4970521192.168.2.593.89.225.40PASV
                                                    Nov 20, 2024 10:16:35.366066933 CET214970593.89.225.40192.168.2.5227 Entering Passive Mode (93,89,225,40,214,224).
                                                    Nov 20, 2024 10:16:35.374452114 CET4970521192.168.2.593.89.225.40STOR SC_user-609290_2024_12_06_08_44_33.jpeg
                                                    Nov 20, 2024 10:16:35.601277113 CET214970593.89.225.40192.168.2.5150 Opening BINARY mode data connection.
                                                    Nov 20, 2024 10:16:36.050051928 CET214998193.89.225.40192.168.2.5220 Microsoft FTP Service
                                                    Nov 20, 2024 10:16:36.050508022 CET4998121192.168.2.593.89.225.40USER pgizemM6
                                                    Nov 20, 2024 10:16:36.283488989 CET214998193.89.225.40192.168.2.5331 Password required
                                                    Nov 20, 2024 10:16:36.286549091 CET4998121192.168.2.593.89.225.40PASS giz95Ffg
                                                    Nov 20, 2024 10:16:36.365796089 CET214970593.89.225.40192.168.2.5226 Transfer complete.
                                                    Nov 20, 2024 10:16:36.519428968 CET214998193.89.225.40192.168.2.5230 User logged in.
                                                    Nov 20, 2024 10:16:36.752979040 CET214998193.89.225.40192.168.2.5200 OPTS UTF8 command successful - UTF8 encoding now ON.
                                                    Nov 20, 2024 10:16:36.753911018 CET4998121192.168.2.593.89.225.40PWD
                                                    Nov 20, 2024 10:16:36.984383106 CET214998193.89.225.40192.168.2.5257 "/" is current directory.
                                                    Nov 20, 2024 10:16:36.986530066 CET4998121192.168.2.593.89.225.40TYPE I
                                                    Nov 20, 2024 10:16:37.219266891 CET214998193.89.225.40192.168.2.5200 Type set to I.
                                                    Nov 20, 2024 10:16:37.219428062 CET4998121192.168.2.593.89.225.40PASV
                                                    Nov 20, 2024 10:16:37.453318119 CET214998193.89.225.40192.168.2.5227 Entering Passive Mode (93,89,225,40,214,226).
                                                    Nov 20, 2024 10:16:37.459336042 CET4998121192.168.2.593.89.225.40STOR SC_user-609290_2024_12_08_14_11_05.jpeg
                                                    Nov 20, 2024 10:16:37.706307888 CET214998193.89.225.40192.168.2.5150 Opening BINARY mode data connection.
                                                    Nov 20, 2024 10:16:38.445390940 CET214998193.89.225.40192.168.2.5226 Transfer complete.
                                                    Nov 20, 2024 10:16:44.914827108 CET4998121192.168.2.593.89.225.40PASV
                                                    Nov 20, 2024 10:16:45.147133112 CET214998193.89.225.40192.168.2.5227 Entering Passive Mode (93,89,225,40,214,236).
                                                    Nov 20, 2024 10:16:45.154583931 CET4998121192.168.2.593.89.225.40STOR SC_user-609290_2024_12_15_14_13_26.jpeg
                                                    Nov 20, 2024 10:16:45.386816025 CET214998193.89.225.40192.168.2.5150 Opening BINARY mode data connection.
                                                    Nov 20, 2024 10:16:46.146773100 CET214998193.89.225.40192.168.2.5226 Transfer complete.
                                                    Nov 20, 2024 10:16:49.313287973 CET4998121192.168.2.593.89.225.40PASV
                                                    Nov 20, 2024 10:16:49.544090986 CET214998193.89.225.40192.168.2.5227 Entering Passive Mode (93,89,225,40,214,237).
                                                    Nov 20, 2024 10:16:49.550401926 CET4998121192.168.2.593.89.225.40STOR SC_user-609290_2024_12_19_13_57_22.jpeg
                                                    Nov 20, 2024 10:16:49.786403894 CET214998193.89.225.40192.168.2.5150 Opening BINARY mode data connection.
                                                    Nov 20, 2024 10:16:50.530503035 CET214998193.89.225.40192.168.2.5226 Transfer complete.
                                                    Nov 20, 2024 10:16:55.192668915 CET4998121192.168.2.593.89.225.40PASV
                                                    Nov 20, 2024 10:16:55.425874949 CET214998193.89.225.40192.168.2.5227 Entering Passive Mode (93,89,225,40,214,238).
                                                    Nov 20, 2024 10:16:55.443665981 CET4998121192.168.2.593.89.225.40STOR SC_user-609290_2024_12_24_09_04_43.jpeg
                                                    Nov 20, 2024 10:16:55.675939083 CET214998193.89.225.40192.168.2.5150 Opening BINARY mode data connection.
                                                    Nov 20, 2024 10:16:56.425601006 CET214998193.89.225.40192.168.2.5226 Transfer complete.
                                                    Nov 20, 2024 10:17:21.747493029 CET4998121192.168.2.593.89.225.40PASV
                                                    Nov 20, 2024 10:17:22.058557987 CET214998193.89.225.40192.168.2.5227 Entering Passive Mode (93,89,225,40,214,248).
                                                    Nov 20, 2024 10:17:22.071757078 CET4998121192.168.2.593.89.225.40STOR SC_user-609290_2025_01_06_23_16_47.jpeg
                                                    Nov 20, 2024 10:17:22.319741011 CET214998193.89.225.40192.168.2.5150 Opening BINARY mode data connection.
                                                    Nov 20, 2024 10:17:23.098596096 CET214998193.89.225.40192.168.2.5226 Transfer complete.
                                                    Nov 20, 2024 10:17:32.669445992 CET4970521192.168.2.593.89.225.40PASV
                                                    Nov 20, 2024 10:17:32.901940107 CET214970593.89.225.40192.168.2.5227 Entering Passive Mode (93,89,225,40,215,0).
                                                    Nov 20, 2024 10:17:32.917874098 CET4970521192.168.2.593.89.225.40STOR SC_user-609290_2025_01_15_20_33_24.jpeg
                                                    Nov 20, 2024 10:17:33.155572891 CET214970593.89.225.40192.168.2.5150 Opening BINARY mode data connection.
                                                    Nov 20, 2024 10:17:33.915132999 CET214970593.89.225.40192.168.2.5226 Transfer complete.
                                                    Nov 20, 2024 10:17:41.475311041 CET4970521192.168.2.593.89.225.40PASV
                                                    Nov 20, 2024 10:17:41.702193022 CET214970593.89.225.40192.168.2.5227 Entering Passive Mode (93,89,225,40,215,4).
                                                    Nov 20, 2024 10:17:41.709525108 CET4970521192.168.2.593.89.225.40STOR SC_user-609290_2025_01_21_22_24_16.jpeg
                                                    Nov 20, 2024 10:17:41.941881895 CET214970593.89.225.40192.168.2.5150 Opening BINARY mode data connection.
                                                    Nov 20, 2024 10:17:42.713195086 CET214970593.89.225.40192.168.2.5226 Transfer complete.
                                                    Nov 20, 2024 10:17:43.890831947 CET4970521192.168.2.593.89.225.40PASV
                                                    Nov 20, 2024 10:17:44.119640112 CET214970593.89.225.40192.168.2.5227 Entering Passive Mode (93,89,225,40,215,5).
                                                    Nov 20, 2024 10:17:44.127636909 CET4970521192.168.2.593.89.225.40STOR SC_user-609290_2025_01_25_04_05_13.jpeg
                                                    Nov 20, 2024 10:17:44.359286070 CET214970593.89.225.40192.168.2.5150 Opening BINARY mode data connection.
                                                    Nov 20, 2024 10:17:45.114805937 CET214970593.89.225.40192.168.2.5226 Transfer complete.
                                                    Nov 20, 2024 10:18:04.666551113 CET4970521192.168.2.593.89.225.40PASV
                                                    Nov 20, 2024 10:18:04.891493082 CET214970593.89.225.40192.168.2.5227 Entering Passive Mode (93,89,225,40,215,14).
                                                    Nov 20, 2024 10:18:04.897196054 CET4970521192.168.2.593.89.225.40STOR SC_user-609290_2025_02_05_09_04_54.jpeg
                                                    Nov 20, 2024 10:18:05.126276970 CET214970593.89.225.40192.168.2.5150 Opening BINARY mode data connection.
                                                    Nov 20, 2024 10:18:05.889470100 CET214970593.89.225.40192.168.2.5226 Transfer complete.
                                                    Nov 20, 2024 10:18:12.274482965 CET4970521192.168.2.593.89.225.40PASV
                                                    Nov 20, 2024 10:18:12.548572063 CET214970593.89.225.40192.168.2.5227 Entering Passive Mode (93,89,225,40,215,15).
                                                    Nov 20, 2024 10:18:12.558841944 CET4970521192.168.2.593.89.225.40STOR SC_user-609290_2025_02_10_22_21_24.jpeg
                                                    Nov 20, 2024 10:18:12.787904978 CET214970593.89.225.40192.168.2.5150 Opening BINARY mode data connection.
                                                    Nov 20, 2024 10:18:13.556902885 CET214970593.89.225.40192.168.2.5226 Transfer complete.
                                                    Nov 20, 2024 10:18:17.636178970 CET4970521192.168.2.593.89.225.40PASV
                                                    Nov 20, 2024 10:18:17.867103100 CET214970593.89.225.40192.168.2.5227 Entering Passive Mode (93,89,225,40,215,19).
                                                    Nov 20, 2024 10:18:17.873076916 CET4970521192.168.2.593.89.225.40STOR SC_user-609290_2025_02_17_12_11_48.jpeg
                                                    Nov 20, 2024 10:18:18.102406025 CET214970593.89.225.40192.168.2.5150 Opening BINARY mode data connection.
                                                    Nov 20, 2024 10:18:18.871360064 CET214970593.89.225.40192.168.2.5226 Transfer complete.
                                                    Nov 20, 2024 10:18:24.494493961 CET214999593.89.225.40192.168.2.5220 Microsoft FTP Service
                                                    Nov 20, 2024 10:18:24.498591900 CET4999521192.168.2.593.89.225.40USER pgizemM6
                                                    Nov 20, 2024 10:18:24.727951050 CET214999593.89.225.40192.168.2.5331 Password required
                                                    Nov 20, 2024 10:18:24.728137970 CET4999521192.168.2.593.89.225.40PASS giz95Ffg
                                                    Nov 20, 2024 10:18:24.954366922 CET214999593.89.225.40192.168.2.5230 User logged in.
                                                    Nov 20, 2024 10:18:25.181462049 CET214999593.89.225.40192.168.2.5200 OPTS UTF8 command successful - UTF8 encoding now ON.
                                                    Nov 20, 2024 10:18:25.181812048 CET4999521192.168.2.593.89.225.40PWD
                                                    Nov 20, 2024 10:18:25.406637907 CET214999593.89.225.40192.168.2.5257 "/" is current directory.
                                                    Nov 20, 2024 10:18:25.406896114 CET4999521192.168.2.593.89.225.40TYPE I
                                                    Nov 20, 2024 10:18:25.631386042 CET214999593.89.225.40192.168.2.5200 Type set to I.
                                                    Nov 20, 2024 10:18:25.634474039 CET4999521192.168.2.593.89.225.40PASV
                                                    Nov 20, 2024 10:18:25.863360882 CET214999593.89.225.40192.168.2.5227 Entering Passive Mode (93,89,225,40,215,24).
                                                    Nov 20, 2024 10:18:25.869101048 CET4999521192.168.2.593.89.225.40STOR SC_user-609290_2025_02_24_11_59_58.jpeg
                                                    Nov 20, 2024 10:18:26.096225977 CET214999593.89.225.40192.168.2.5150 Opening BINARY mode data connection.
                                                    Nov 20, 2024 10:18:26.844835043 CET214999593.89.225.40192.168.2.5226 Transfer complete.
                                                    Nov 20, 2024 10:18:29.010457039 CET4999521192.168.2.593.89.225.40PASV
                                                    Nov 20, 2024 10:18:29.424500942 CET4999521192.168.2.593.89.225.40PASV
                                                    Nov 20, 2024 10:18:29.893198013 CET214999593.89.225.40192.168.2.5227 Entering Passive Mode (93,89,225,40,215,28).
                                                    Nov 20, 2024 10:18:29.899780989 CET4999521192.168.2.593.89.225.40STOR SC_user-609290_2025_03_02_23_45_38.jpeg
                                                    Nov 20, 2024 10:18:30.127130032 CET214999593.89.225.40192.168.2.5150 Opening BINARY mode data connection.
                                                    Nov 20, 2024 10:18:30.902210951 CET214999593.89.225.40192.168.2.5226 Transfer complete.
                                                    Nov 20, 2024 10:18:34.762484074 CET4999521192.168.2.593.89.225.40PASV
                                                    Nov 20, 2024 10:18:34.994328976 CET214999593.89.225.40192.168.2.5227 Entering Passive Mode (93,89,225,40,215,29).
                                                    Nov 20, 2024 10:18:35.002804995 CET4999521192.168.2.593.89.225.40STOR SC_user-609290_2025_03_07_16_02_47.jpeg
                                                    Nov 20, 2024 10:18:35.232273102 CET214999593.89.225.40192.168.2.5150 Opening BINARY mode data connection.
                                                    Nov 20, 2024 10:18:36.050920963 CET214999593.89.225.40192.168.2.5226 Transfer complete.
                                                    Nov 20, 2024 10:19:09.884000063 CET4999521192.168.2.593.89.225.40PASV
                                                    Nov 20, 2024 10:19:10.112118959 CET214999593.89.225.40192.168.2.5227 Entering Passive Mode (93,89,225,40,215,56).
                                                    Nov 20, 2024 10:19:10.118788004 CET4999521192.168.2.593.89.225.40STOR SC_user-609290_2024_11_20_04_19_08.jpeg
                                                    Nov 20, 2024 10:19:10.351357937 CET214999593.89.225.40192.168.2.5150 Opening BINARY mode data connection.
                                                    Nov 20, 2024 10:19:11.114491940 CET214999593.89.225.40192.168.2.5226 Transfer complete.

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:04:15:01
                                                    Start date:20/11/2024
                                                    Path:C:\Users\user\Desktop\order and drawings_pdf.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\order and drawings_pdf.exe"
                                                    Imagebase:0x620000
                                                    File size:1'075'200 bytes
                                                    MD5 hash:4726039E5F4D03F6F3F9CC0CD8D423A1
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2085096156.0000000003670000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2085096156.0000000003670000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.2085096156.0000000003670000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                    • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000000.00000002.2085096156.0000000003670000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:2
                                                    Start time:04:15:02
                                                    Start date:20/11/2024
                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\order and drawings_pdf.exe"
                                                    Imagebase:0x1f0000
                                                    File size:45'984 bytes
                                                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4522755984.000000000252C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4520282599.00000000005C2000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4520282599.00000000005C2000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4522755984.0000000002501000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4522755984.0000000002501000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:high
                                                    Has exited:false

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:4.2%
                                                      Dynamic/Decrypted Code Coverage:1.3%
                                                      Signature Coverage:6.9%
                                                      Total number of Nodes:2000
                                                      Total number of Limit Nodes:63
                                                      execution_graph 93218 623742 93219 62374b 93218->93219 93220 6237c8 93219->93220 93221 623769 93219->93221 93259 6237c6 93219->93259 93223 691e00 93220->93223 93224 6237ce 93220->93224 93225 623776 93221->93225 93226 62382c PostQuitMessage 93221->93226 93222 6237ab DefWindowProcW 93252 6237b9 93222->93252 93273 622ff6 16 API calls 93223->93273 93227 6237d3 93224->93227 93228 6237f6 SetTimer RegisterWindowMessageW 93224->93228 93230 691e88 93225->93230 93231 623781 93225->93231 93226->93252 93232 6237da KillTimer 93227->93232 93233 691da3 93227->93233 93235 62381f CreatePopupMenu 93228->93235 93228->93252 93288 664ddd 60 API calls _memset 93230->93288 93236 623836 93231->93236 93237 623789 93231->93237 93270 623847 Shell_NotifyIconW _memset 93232->93270 93245 691da8 93233->93245 93246 691ddc MoveWindow 93233->93246 93234 691e27 93274 63e312 335 API calls Mailbox 93234->93274 93235->93252 93263 63eb83 93236->93263 93241 691e6d 93237->93241 93242 623794 93237->93242 93241->93222 93287 65a5f3 48 API calls 93241->93287 93250 62379f 93242->93250 93251 691e58 93242->93251 93243 691e9a 93243->93222 93243->93252 93247 691dcb SetFocus 93245->93247 93248 691dac 93245->93248 93246->93252 93247->93252 93248->93250 93253 691db5 93248->93253 93249 6237ed 93271 62390f DeleteObject DestroyWindow Mailbox 93249->93271 93250->93222 93275 623847 Shell_NotifyIconW _memset 93250->93275 93286 6655bd 70 API calls _memset 93251->93286 93272 622ff6 16 API calls 93253->93272 93258 691e68 93258->93252 93259->93222 93261 691e4c 93276 624ffc 93261->93276 93264 63eb9a _memset 93263->93264 93265 63ec1c 93263->93265 93289 6251af 93264->93289 93265->93252 93267 63ec05 KillTimer SetTimer 93267->93265 93268 63ebc1 93268->93267 93269 693c7a Shell_NotifyIconW 93268->93269 93269->93267 93270->93249 93271->93252 93272->93252 93273->93234 93274->93250 93275->93261 93277 625027 _memset 93276->93277 93432 624c30 93277->93432 93280 6250ac 93282 693d28 Shell_NotifyIconW 93280->93282 93283 6250ca Shell_NotifyIconW 93280->93283 93284 6251af 50 API calls 93283->93284 93285 6250df 93284->93285 93285->93259 93286->93258 93287->93259 93288->93243 93290 6252a2 Mailbox 93289->93290 93291 6251cb 93289->93291 93290->93268 93311 626b0f 93291->93311 93294 6251e6 93316 626a63 93294->93316 93295 693ca1 LoadStringW 93298 693cbb 93295->93298 93297 6251fb 93297->93298 93299 62520c 93297->93299 93300 62510d 48 API calls 93298->93300 93301 625216 93299->93301 93302 6252a7 93299->93302 93305 693cc5 93300->93305 93327 62510d 93301->93327 93336 626eed 93302->93336 93308 625220 _memset _wcscpy 93305->93308 93340 62518c 93305->93340 93307 693ce7 93310 62518c 48 API calls 93307->93310 93309 625288 Shell_NotifyIconW 93308->93309 93309->93290 93310->93308 93350 63f4ea 93311->93350 93313 626b34 93359 626b4a 93313->93359 93317 626adf 93316->93317 93318 626a6f __NMSG_WRITE 93316->93318 93394 62b18b 93317->93394 93320 626ad7 93318->93320 93321 626a8b 93318->93321 93393 62c369 48 API calls 93320->93393 93323 626b4a 48 API calls 93321->93323 93325 626a95 93323->93325 93324 626ab6 ___crtGetEnvironmentStringsW 93324->93297 93384 63ee75 93325->93384 93328 62511f 93327->93328 93329 691be7 93327->93329 93406 62b384 93328->93406 93415 65a58f 48 API calls ___crtGetEnvironmentStringsW 93329->93415 93332 691bf1 93334 626eed 48 API calls 93332->93334 93333 62512b 93333->93308 93335 691bf9 Mailbox 93334->93335 93337 626f00 93336->93337 93338 626ef8 93336->93338 93337->93308 93421 62dd47 48 API calls ___crtGetEnvironmentStringsW 93338->93421 93341 625197 93340->93341 93342 691ace 93341->93342 93343 62519f 93341->93343 93345 626b4a 48 API calls 93342->93345 93422 625130 93343->93422 93347 691adb __NMSG_WRITE 93345->93347 93346 6251aa 93346->93307 93348 63ee75 48 API calls 93347->93348 93349 691b07 ___crtGetEnvironmentStringsW 93348->93349 93352 63f4f2 __calloc_impl 93350->93352 93353 63f50c 93352->93353 93354 63f50e std::exception::exception 93352->93354 93362 64395c 93352->93362 93353->93313 93376 646805 RaiseException 93354->93376 93356 63f538 93377 64673b 47 API calls _free 93356->93377 93358 63f54a 93358->93313 93360 63f4ea 48 API calls 93359->93360 93361 6251d9 93360->93361 93361->93294 93361->93295 93363 6439d7 __calloc_impl 93362->93363 93368 643968 __calloc_impl 93362->93368 93383 647c0e 47 API calls __getptd_noexit 93363->93383 93366 64399b RtlAllocateHeap 93366->93368 93375 6439cf 93366->93375 93368->93366 93369 643973 93368->93369 93370 6439c3 93368->93370 93373 6439c1 93368->93373 93369->93368 93378 6481c2 47 API calls __NMSG_WRITE 93369->93378 93379 64821f 47 API calls 5 library calls 93369->93379 93380 641145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 93369->93380 93381 647c0e 47 API calls __getptd_noexit 93370->93381 93382 647c0e 47 API calls __getptd_noexit 93373->93382 93375->93352 93376->93356 93377->93358 93378->93369 93379->93369 93381->93373 93382->93375 93383->93375 93386 63f4ea __calloc_impl 93384->93386 93385 64395c _W_store_winword 47 API calls 93385->93386 93386->93385 93387 63f50c 93386->93387 93388 63f50e std::exception::exception 93386->93388 93387->93324 93398 646805 RaiseException 93388->93398 93390 63f538 93399 64673b 47 API calls _free 93390->93399 93392 63f54a 93392->93324 93393->93324 93395 62b1a2 ___crtGetEnvironmentStringsW 93394->93395 93396 62b199 93394->93396 93395->93324 93396->93395 93400 62bdfa 93396->93400 93398->93390 93399->93392 93401 62be0a ___crtGetEnvironmentStringsW 93400->93401 93402 62be0d 93400->93402 93401->93395 93403 63f4ea 48 API calls 93402->93403 93404 62be17 93403->93404 93405 63ee75 48 API calls 93404->93405 93405->93401 93407 62b392 93406->93407 93414 62b3c5 ___crtGetEnvironmentStringsW 93406->93414 93408 62b3b8 93407->93408 93409 62b3fd 93407->93409 93407->93414 93416 62bb85 93408->93416 93411 63f4ea 48 API calls 93409->93411 93412 62b407 93411->93412 93413 63f4ea 48 API calls 93412->93413 93413->93414 93414->93333 93415->93332 93417 62bb9b 93416->93417 93420 62bb96 ___crtGetEnvironmentStringsW 93416->93420 93418 691b77 93417->93418 93419 63ee75 48 API calls 93417->93419 93419->93420 93420->93414 93421->93337 93423 62513f __NMSG_WRITE 93422->93423 93424 625151 93423->93424 93425 691b27 93423->93425 93426 62bb85 48 API calls 93424->93426 93427 626b4a 48 API calls 93425->93427 93429 62515e ___crtGetEnvironmentStringsW 93426->93429 93428 691b34 93427->93428 93430 63ee75 48 API calls 93428->93430 93429->93346 93431 691b57 ___crtGetEnvironmentStringsW 93430->93431 93433 624c44 93432->93433 93434 693c33 93432->93434 93433->93280 93436 665819 61 API calls _W_store_winword 93433->93436 93434->93433 93435 693c3c DestroyIcon 93434->93435 93435->93433 93436->93280 93437 cab8ab 93440 cab520 93437->93440 93439 cab8f7 93453 ca8f50 93440->93453 93443 cab5f0 CreateFileW 93444 cab5bf 93443->93444 93446 cab5fd 93443->93446 93445 cab619 VirtualAlloc 93444->93445 93444->93446 93451 cab720 CloseHandle 93444->93451 93452 cab730 VirtualFree 93444->93452 93456 cac430 GetPEB 93444->93456 93445->93446 93447 cab63a ReadFile 93445->93447 93448 cab81a 93446->93448 93449 cab80c VirtualFree 93446->93449 93447->93446 93450 cab658 VirtualAlloc 93447->93450 93448->93439 93449->93448 93450->93444 93450->93446 93451->93444 93452->93444 93458 cac3d0 GetPEB 93453->93458 93455 ca95db 93455->93444 93457 cac45a 93456->93457 93457->93443 93459 cac3fa 93458->93459 93459->93455 93460 698eb8 93464 66a635 93460->93464 93462 698ec3 93463 66a635 84 API calls 93462->93463 93463->93462 93465 66a66f 93464->93465 93469 66a642 93464->93469 93465->93462 93466 66a671 93496 63ec4e 81 API calls 93466->93496 93467 66a676 93475 62936c 93467->93475 93469->93465 93469->93466 93469->93467 93473 66a669 93469->93473 93471 66a67d 93472 62510d 48 API calls 93471->93472 93472->93465 93495 634525 61 API calls ___crtGetEnvironmentStringsW 93473->93495 93476 629384 93475->93476 93486 629380 93475->93486 93477 694cbd __i64tow 93476->93477 93478 694bbf 93476->93478 93479 629398 93476->93479 93488 6293b0 __itow Mailbox _wcscpy 93476->93488 93480 694bc8 93478->93480 93481 694ca5 93478->93481 93497 64172b 80 API calls 4 library calls 93479->93497 93487 694be7 93480->93487 93480->93488 93504 64172b 80 API calls 4 library calls 93481->93504 93484 63f4ea 48 API calls 93485 6293ba 93484->93485 93485->93486 93498 62ce19 93485->93498 93486->93471 93490 63f4ea 48 API calls 93487->93490 93488->93484 93491 694c04 93490->93491 93492 63f4ea 48 API calls 93491->93492 93493 694c2a 93492->93493 93493->93486 93494 62ce19 48 API calls 93493->93494 93494->93486 93495->93465 93496->93467 93497->93488 93499 62ce28 __NMSG_WRITE 93498->93499 93500 63ee75 48 API calls 93499->93500 93501 62ce50 ___crtGetEnvironmentStringsW 93500->93501 93502 63f4ea 48 API calls 93501->93502 93503 62ce66 93502->93503 93503->93486 93504->93488 93505 69197b 93510 63dd94 93505->93510 93509 69198a 93511 63f4ea 48 API calls 93510->93511 93512 63dd9c 93511->93512 93513 63ddb0 93512->93513 93518 63df3d 93512->93518 93517 640f0a 52 API calls __cinit 93513->93517 93517->93509 93519 63df46 93518->93519 93520 63dda8 93518->93520 93550 640f0a 52 API calls __cinit 93519->93550 93522 63ddc0 93520->93522 93551 62d7f7 93522->93551 93525 626a63 48 API calls 93526 63de1a 93525->93526 93556 63dfb4 93526->93556 93532 6924c8 93534 63dea4 GetCurrentProcess 93573 63df5f LoadLibraryA GetProcAddress 93534->93573 93536 63dee3 93567 63e00c 93536->93567 93537 63df31 GetSystemInfo 93538 63df0e 93537->93538 93540 63df21 93538->93540 93541 63df1c FreeLibrary 93538->93541 93540->93513 93541->93540 93543 63debb 93543->93536 93543->93537 93544 63df29 GetSystemInfo 93546 63df03 93544->93546 93545 63def9 93570 63dff4 93545->93570 93546->93538 93549 63df09 FreeLibrary 93546->93549 93549->93538 93550->93520 93552 63f4ea 48 API calls 93551->93552 93553 62d818 93552->93553 93554 63f4ea 48 API calls 93553->93554 93555 62d826 GetVersionExW 93554->93555 93555->93525 93557 63dfbd 93556->93557 93558 62b18b 48 API calls 93557->93558 93559 63de22 93558->93559 93560 626571 93559->93560 93561 62657f 93560->93561 93562 62b18b 48 API calls 93561->93562 93563 62658f 93562->93563 93563->93532 93564 63df77 93563->93564 93574 63df89 93564->93574 93578 63e01e 93567->93578 93571 63e00c 2 API calls 93570->93571 93572 63df01 GetNativeSystemInfo 93571->93572 93572->93546 93573->93543 93575 63dea0 93574->93575 93576 63df92 LoadLibraryA 93574->93576 93575->93534 93575->93543 93576->93575 93577 63dfa3 GetProcAddress 93576->93577 93577->93575 93579 63def1 93578->93579 93580 63e027 LoadLibraryA 93578->93580 93579->93544 93579->93545 93580->93579 93581 63e038 GetProcAddress 93580->93581 93581->93579 93582 6919cb 93587 622322 93582->93587 93584 6919d1 93620 640f0a 52 API calls __cinit 93584->93620 93586 6919db 93588 622344 93587->93588 93621 6226df 93588->93621 93593 62d7f7 48 API calls 93594 622384 93593->93594 93595 62d7f7 48 API calls 93594->93595 93596 62238e 93595->93596 93597 62d7f7 48 API calls 93596->93597 93598 622398 93597->93598 93599 62d7f7 48 API calls 93598->93599 93600 6223de 93599->93600 93601 62d7f7 48 API calls 93600->93601 93602 6224c1 93601->93602 93629 62263f 93602->93629 93606 6224f1 93607 62d7f7 48 API calls 93606->93607 93608 6224fb 93607->93608 93658 622745 93608->93658 93610 622546 93611 622556 GetStdHandle 93610->93611 93612 6225b1 93611->93612 93613 69501d 93611->93613 93614 6225b7 CoInitialize 93612->93614 93613->93612 93615 695026 93613->93615 93614->93584 93665 6692d4 53 API calls 93615->93665 93617 69502d 93666 6699f9 CreateThread 93617->93666 93619 695039 CloseHandle 93619->93614 93620->93586 93667 622854 93621->93667 93624 626a63 48 API calls 93625 62234a 93624->93625 93626 62272e 93625->93626 93681 6227ec 6 API calls 93626->93681 93628 62237a 93628->93593 93630 62d7f7 48 API calls 93629->93630 93631 62264f 93630->93631 93632 62d7f7 48 API calls 93631->93632 93633 622657 93632->93633 93682 6226a7 93633->93682 93636 6226a7 48 API calls 93637 622667 93636->93637 93638 62d7f7 48 API calls 93637->93638 93639 622672 93638->93639 93640 63f4ea 48 API calls 93639->93640 93641 6224cb 93640->93641 93642 6222a4 93641->93642 93643 6222b2 93642->93643 93644 62d7f7 48 API calls 93643->93644 93645 6222bd 93644->93645 93646 62d7f7 48 API calls 93645->93646 93647 6222c8 93646->93647 93648 62d7f7 48 API calls 93647->93648 93649 6222d3 93648->93649 93650 62d7f7 48 API calls 93649->93650 93651 6222de 93650->93651 93652 6226a7 48 API calls 93651->93652 93653 6222e9 93652->93653 93654 63f4ea 48 API calls 93653->93654 93655 6222f0 93654->93655 93656 6222f9 RegisterWindowMessageW 93655->93656 93657 691fe7 93655->93657 93656->93606 93659 695f4d 93658->93659 93660 622755 93658->93660 93687 66c942 50 API calls 93659->93687 93661 63f4ea 48 API calls 93660->93661 93663 62275d 93661->93663 93663->93610 93664 695f58 93665->93617 93666->93619 93688 6699df 54 API calls 93666->93688 93674 622870 93667->93674 93670 622870 48 API calls 93671 622864 93670->93671 93672 62d7f7 48 API calls 93671->93672 93673 622716 93672->93673 93673->93624 93675 62d7f7 48 API calls 93674->93675 93676 62287b 93675->93676 93677 62d7f7 48 API calls 93676->93677 93678 622883 93677->93678 93679 62d7f7 48 API calls 93678->93679 93680 62285c 93679->93680 93680->93670 93681->93628 93683 62d7f7 48 API calls 93682->93683 93684 6226b0 93683->93684 93685 62d7f7 48 API calls 93684->93685 93686 62265f 93685->93686 93686->93636 93687->93664 93689 62ef80 93692 633b70 93689->93692 93691 62ef8c 93693 6342a5 93692->93693 93694 633bc8 93692->93694 93799 66cc5c 86 API calls 4 library calls 93693->93799 93695 633bef 93694->93695 93697 696fd1 93694->93697 93699 696f7e 93694->93699 93706 696f9b 93694->93706 93696 63f4ea 48 API calls 93695->93696 93698 633c18 93696->93698 93787 67ceca 335 API calls Mailbox 93697->93787 93702 63f4ea 48 API calls 93698->93702 93699->93695 93703 696f87 93699->93703 93701 696fbe 93786 66cc5c 86 API calls 4 library calls 93701->93786 93758 633c2c __NMSG_WRITE ___crtGetEnvironmentStringsW 93702->93758 93784 67d552 335 API calls Mailbox 93703->93784 93706->93701 93785 67da0e 335 API calls 2 library calls 93706->93785 93709 6973b0 93709->93691 93710 69737a 93805 66cc5c 86 API calls 4 library calls 93710->93805 93711 697297 93795 66cc5c 86 API calls 4 library calls 93711->93795 93715 63dce0 53 API calls 93715->93758 93716 69707e 93788 66cc5c 86 API calls 4 library calls 93716->93788 93722 6340df 93796 66cc5c 86 API calls 4 library calls 93722->93796 93723 62d645 53 API calls 93723->93758 93726 6972d2 93797 66cc5c 86 API calls 4 library calls 93726->93797 93727 62fe30 335 API calls 93727->93758 93729 697350 93803 66cc5c 86 API calls 4 library calls 93729->93803 93731 697363 93804 66cc5c 86 API calls 4 library calls 93731->93804 93733 6972e9 93798 66cc5c 86 API calls 4 library calls 93733->93798 93734 6342f2 93806 66cc5c 86 API calls 4 library calls 93734->93806 93737 626a63 48 API calls 93737->93758 93739 69714c 93792 67ccdc 48 API calls 93739->93792 93740 62d286 48 API calls 93740->93758 93741 63f4ea 48 API calls 93741->93758 93744 69733f 93802 66cc5c 86 API calls 4 library calls 93744->93802 93745 633f2b 93745->93691 93746 626eed 48 API calls 93746->93758 93749 6971a1 93794 63c15c 48 API calls 93749->93794 93752 63ee75 48 API calls 93752->93758 93753 6971e1 93753->93745 93801 66cc5c 86 API calls 4 library calls 93753->93801 93756 69715f 93756->93749 93793 67ccdc 48 API calls 93756->93793 93757 6971ce 93759 63c050 48 API calls 93757->93759 93758->93693 93758->93710 93758->93711 93758->93715 93758->93716 93758->93722 93758->93723 93758->93726 93758->93727 93758->93729 93758->93731 93758->93733 93758->93734 93758->93737 93758->93739 93758->93740 93758->93741 93758->93744 93758->93745 93758->93746 93758->93752 93758->93753 93764 62d9a0 53 API calls __cinit 93758->93764 93765 62d83d 53 API calls 93758->93765 93766 62cdb9 48 API calls 93758->93766 93767 62d6e9 93758->93767 93771 63c15c 48 API calls 93758->93771 93772 63c050 93758->93772 93783 63becb 335 API calls 93758->93783 93789 62dcae 50 API calls Mailbox 93758->93789 93790 67ccdc 48 API calls 93758->93790 93791 66a1eb 50 API calls 93758->93791 93761 6971d6 93759->93761 93760 6971ab 93760->93693 93760->93757 93761->93753 93762 697313 93761->93762 93800 66cc5c 86 API calls 4 library calls 93762->93800 93764->93758 93765->93758 93766->93758 93768 62d6f4 93767->93768 93769 62d71b 93768->93769 93807 62d764 55 API calls 93768->93807 93769->93758 93771->93758 93773 63c064 93772->93773 93775 63c069 Mailbox 93772->93775 93808 63c1af 48 API calls 93773->93808 93781 63c077 93775->93781 93809 63c15c 48 API calls 93775->93809 93777 63f4ea 48 API calls 93779 63c108 93777->93779 93778 63c152 93778->93758 93780 63f4ea 48 API calls 93779->93780 93782 63c113 93780->93782 93781->93777 93781->93778 93782->93758 93783->93758 93784->93745 93785->93701 93786->93697 93787->93758 93788->93745 93789->93758 93790->93758 93791->93758 93792->93756 93793->93756 93794->93760 93795->93722 93796->93745 93797->93733 93798->93745 93799->93745 93800->93745 93801->93745 93802->93745 93803->93745 93804->93745 93805->93745 93806->93709 93807->93769 93808->93775 93809->93781 93810 6919ba 93815 63c75a 93810->93815 93814 6919c9 93816 62d7f7 48 API calls 93815->93816 93817 63c7c8 93816->93817 93823 63d26c 93817->93823 93820 63c865 93821 63c881 93820->93821 93826 63d1fa 48 API calls ___crtGetEnvironmentStringsW 93820->93826 93822 640f0a 52 API calls __cinit 93821->93822 93822->93814 93827 63d298 93823->93827 93826->93820 93828 63d28b 93827->93828 93829 63d2a5 93827->93829 93828->93820 93829->93828 93830 63d2ac RegOpenKeyExW 93829->93830 93830->93828 93831 63d2c6 RegQueryValueExW 93830->93831 93832 63d2e7 93831->93832 93833 63d2fc RegCloseKey 93831->93833 93832->93833 93833->93828 93834 6919dd 93839 624a30 93834->93839 93836 6919f1 93859 640f0a 52 API calls __cinit 93836->93859 93838 6919fb 93840 624a40 __ftell_nolock 93839->93840 93841 62d7f7 48 API calls 93840->93841 93842 624af6 93841->93842 93860 625374 93842->93860 93844 624aff 93867 62363c 93844->93867 93847 62518c 48 API calls 93848 624b18 93847->93848 93873 6264cf 93848->93873 93851 62d7f7 48 API calls 93852 624b32 93851->93852 93879 6249fb 93852->93879 93854 624b43 Mailbox 93854->93836 93855 624b3d _wcscat Mailbox __NMSG_WRITE 93855->93854 93856 62ce19 48 API calls 93855->93856 93857 6264cf 48 API calls 93855->93857 93858 6261a6 48 API calls 93855->93858 93856->93855 93857->93855 93858->93855 93859->93838 93893 64f8a0 93860->93893 93863 62ce19 48 API calls 93864 6253a7 93863->93864 93895 62660f 93864->93895 93866 6253b1 Mailbox 93866->93844 93868 623649 __ftell_nolock 93867->93868 93902 62366c GetFullPathNameW 93868->93902 93870 62365a 93871 626a63 48 API calls 93870->93871 93872 623669 93871->93872 93872->93847 93875 62651b 93873->93875 93878 6264dd ___crtGetEnvironmentStringsW 93873->93878 93874 63f4ea 48 API calls 93876 624b29 93874->93876 93877 63f4ea 48 API calls 93875->93877 93876->93851 93877->93878 93878->93874 93904 62bcce 93879->93904 93882 6941cc RegQueryValueExW 93884 6941e5 93882->93884 93885 694246 RegCloseKey 93882->93885 93883 624a2b 93883->93855 93886 63f4ea 48 API calls 93884->93886 93887 6941fe 93886->93887 93910 6247b7 93887->93910 93890 69423b 93890->93885 93891 694224 93892 626a63 48 API calls 93891->93892 93892->93890 93894 625381 GetModuleFileNameW 93893->93894 93894->93863 93896 64f8a0 __ftell_nolock 93895->93896 93897 62661c GetFullPathNameW 93896->93897 93898 626a63 48 API calls 93897->93898 93899 626643 93898->93899 93900 626571 48 API calls 93899->93900 93901 62664f 93900->93901 93901->93866 93903 62368a 93902->93903 93903->93870 93905 624a0a RegOpenKeyExW 93904->93905 93906 62bce8 93904->93906 93905->93882 93905->93883 93907 63f4ea 48 API calls 93906->93907 93908 62bcf2 93907->93908 93909 63ee75 48 API calls 93908->93909 93909->93905 93911 63f4ea 48 API calls 93910->93911 93912 6247c9 RegQueryValueExW 93911->93912 93912->93890 93912->93891 93913 699bec 93947 630ae0 Mailbox ___crtGetEnvironmentStringsW 93913->93947 93918 630509 94086 66cc5c 86 API calls 4 library calls 93918->94086 93919 63f4ea 48 API calls 93941 62fec8 93919->93941 93921 63146e 93928 626eed 48 API calls 93921->93928 93923 626eed 48 API calls 93923->93941 93924 631473 94085 66cc5c 86 API calls 4 library calls 93924->94085 93925 69a922 93926 69a246 93929 626eed 48 API calls 93926->93929 93939 62ffe1 Mailbox 93928->93939 93929->93939 93932 62d7f7 48 API calls 93932->93941 93933 69a873 93934 69a30e 93934->93939 94081 6597ed InterlockedDecrement 93934->94081 93935 640f0a 52 API calls __cinit 93935->93941 93936 62ce19 48 API calls 93936->93947 93937 6597ed InterlockedDecrement 93937->93941 93940 69a973 94087 66cc5c 86 API calls 4 library calls 93940->94087 93941->93918 93941->93919 93941->93921 93941->93923 93941->93924 93941->93926 93941->93932 93941->93934 93941->93935 93941->93937 93941->93939 93941->93940 93944 6315b5 93941->93944 94078 631820 335 API calls 2 library calls 93941->94078 94079 631d10 59 API calls Mailbox 93941->94079 93943 69a982 94084 66cc5c 86 API calls 4 library calls 93944->94084 93947->93936 93947->93939 93947->93941 93948 69a706 93947->93948 93950 631526 Mailbox 93947->93950 93951 63f4ea 48 API calls 93947->93951 93952 6597ed InterlockedDecrement 93947->93952 93956 62fe30 93947->93956 93985 680d09 93947->93985 93988 680d1d 93947->93988 93991 676ff0 93947->93991 94000 67f0ac 93947->94000 94032 66a6ef 93947->94032 94038 67e822 93947->94038 94080 67ef61 82 API calls 2 library calls 93947->94080 94082 66cc5c 86 API calls 4 library calls 93948->94082 94083 66cc5c 86 API calls 4 library calls 93950->94083 93951->93947 93952->93947 93957 62fe50 93956->93957 93981 62fe7e 93956->93981 93958 63f4ea 48 API calls 93957->93958 93958->93981 93959 640f0a 52 API calls __cinit 93959->93981 93960 63146e 93961 626eed 48 API calls 93960->93961 93982 62ffe1 93961->93982 93962 630509 94093 66cc5c 86 API calls 4 library calls 93962->94093 93966 63f4ea 48 API calls 93966->93981 93967 69a922 93967->93947 93968 69a246 93971 626eed 48 API calls 93968->93971 93969 631473 94092 66cc5c 86 API calls 4 library calls 93969->94092 93971->93982 93973 626eed 48 API calls 93973->93981 93974 62d7f7 48 API calls 93974->93981 93975 69a873 93975->93947 93976 6597ed InterlockedDecrement 93976->93981 93977 69a30e 93977->93982 94090 6597ed InterlockedDecrement 93977->94090 93979 69a973 94094 66cc5c 86 API calls 4 library calls 93979->94094 93981->93959 93981->93960 93981->93962 93981->93966 93981->93968 93981->93969 93981->93973 93981->93974 93981->93976 93981->93977 93981->93979 93981->93982 93984 6315b5 93981->93984 94088 631820 335 API calls 2 library calls 93981->94088 94089 631d10 59 API calls Mailbox 93981->94089 93982->93947 93983 69a982 94091 66cc5c 86 API calls 4 library calls 93984->94091 94095 67f8ae 93985->94095 93987 680d19 93987->93947 93989 67f8ae 129 API calls 93988->93989 93990 680d2d 93989->93990 93990->93947 93992 62936c 81 API calls 93991->93992 93993 67702a 93992->93993 94221 62b470 93993->94221 93995 67703a 93996 62fe30 335 API calls 93995->93996 93997 67705f 93995->93997 93996->93997 93999 677063 93997->93999 94249 62cdb9 48 API calls 93997->94249 93999->93947 94001 62d7f7 48 API calls 94000->94001 94002 67f0c0 94001->94002 94003 62d7f7 48 API calls 94002->94003 94004 67f0c8 94003->94004 94005 62d7f7 48 API calls 94004->94005 94006 67f0d0 94005->94006 94007 62936c 81 API calls 94006->94007 94029 67f0de 94007->94029 94008 626a63 48 API calls 94008->94029 94009 67f2cc 94010 67f2f9 Mailbox 94009->94010 94276 626b68 48 API calls 94009->94276 94010->93947 94012 67f2b3 94013 62518c 48 API calls 94012->94013 94016 67f2c0 94013->94016 94014 62c799 48 API calls 94014->94029 94015 67f2ce 94017 62518c 48 API calls 94015->94017 94020 62510d 48 API calls 94016->94020 94021 67f2dd 94017->94021 94018 626eed 48 API calls 94018->94029 94019 62bdfa 48 API calls 94022 67f175 CharUpperBuffW 94019->94022 94020->94009 94023 62510d 48 API calls 94021->94023 94265 62d645 94022->94265 94023->94009 94024 62bdfa 48 API calls 94026 67f23a CharUpperBuffW 94024->94026 94275 63d922 55 API calls 2 library calls 94026->94275 94028 62936c 81 API calls 94028->94029 94029->94008 94029->94009 94029->94010 94029->94012 94029->94014 94029->94015 94029->94018 94029->94019 94029->94024 94029->94028 94030 62510d 48 API calls 94029->94030 94031 62518c 48 API calls 94029->94031 94030->94029 94031->94029 94033 66a6fb 94032->94033 94034 63f4ea 48 API calls 94033->94034 94035 66a709 94034->94035 94036 66a717 94035->94036 94037 62d7f7 48 API calls 94035->94037 94036->93947 94037->94036 94039 67e84e 94038->94039 94040 67e868 94038->94040 94280 66cc5c 86 API calls 4 library calls 94039->94280 94281 67ccdc 48 API calls 94040->94281 94043 67e871 94044 62fe30 334 API calls 94043->94044 94045 67e8cf 94044->94045 94046 67e96a 94045->94046 94048 67e916 94045->94048 94077 67e860 Mailbox 94045->94077 94047 67e978 94046->94047 94051 67e9c7 94046->94051 94300 66a69d 48 API calls 94047->94300 94282 669b72 48 API calls 94048->94282 94050 67e949 94283 6345e0 94050->94283 94054 62936c 81 API calls 94051->94054 94051->94077 94056 67e9e1 94054->94056 94055 67e99b 94301 62bc74 48 API calls 94055->94301 94058 62bdfa 48 API calls 94056->94058 94060 67ea05 CharUpperBuffW 94058->94060 94059 67e9a3 Mailbox 94302 633200 94059->94302 94062 67ea1f 94060->94062 94063 67ea26 94062->94063 94064 67ea72 94062->94064 94374 669b72 48 API calls 94063->94374 94065 62936c 81 API calls 94064->94065 94066 67ea7a 94065->94066 94375 621caa 49 API calls 94066->94375 94069 67ea54 94070 6345e0 334 API calls 94069->94070 94070->94077 94071 67ea84 94072 62936c 81 API calls 94071->94072 94071->94077 94073 67ea9f 94072->94073 94376 62bc74 48 API calls 94073->94376 94075 67eaaf 94076 633200 334 API calls 94075->94076 94076->94077 94077->93947 94078->93941 94079->93941 94080->93947 94081->93939 94082->93950 94083->93939 94084->93939 94085->93933 94086->93925 94087->93943 94088->93981 94089->93981 94090->93982 94091->93982 94092->93975 94093->93967 94094->93983 94096 62936c 81 API calls 94095->94096 94097 67f8ea 94096->94097 94100 67f92c Mailbox 94097->94100 94131 680567 94097->94131 94099 67fb8b 94101 67fcfa 94099->94101 94103 67fb95 94099->94103 94100->93987 94195 680688 89 API calls Mailbox 94101->94195 94144 67f70a 94103->94144 94105 67fd07 94105->94103 94106 67fd13 94105->94106 94106->94100 94107 62936c 81 API calls 94124 67f984 Mailbox 94107->94124 94112 67fbc9 94158 63ed18 94112->94158 94115 67fbe3 94193 66cc5c 86 API calls 4 library calls 94115->94193 94116 67fbfd 94118 63c050 48 API calls 94116->94118 94120 67fc14 94118->94120 94119 67fbee GetCurrentProcess TerminateProcess 94119->94116 94121 631b90 48 API calls 94120->94121 94130 67fc3e 94120->94130 94123 67fc2d 94121->94123 94122 67fd65 94122->94100 94127 67fd7e FreeLibrary 94122->94127 94125 68040f 105 API calls 94123->94125 94124->94099 94124->94100 94124->94107 94124->94124 94191 6829e8 48 API calls ___crtGetEnvironmentStringsW 94124->94191 94192 67fda5 60 API calls 2 library calls 94124->94192 94125->94130 94127->94100 94130->94122 94162 631b90 94130->94162 94178 68040f 94130->94178 94194 62dcae 50 API calls Mailbox 94130->94194 94132 62bdfa 48 API calls 94131->94132 94133 680582 CharLowerBuffW 94132->94133 94196 661f11 94133->94196 94137 62d7f7 48 API calls 94138 6805bb 94137->94138 94203 6269e9 48 API calls ___crtGetEnvironmentStringsW 94138->94203 94140 6805d2 94141 62b18b 48 API calls 94140->94141 94142 6805de Mailbox 94141->94142 94143 68061a Mailbox 94142->94143 94204 67fda5 60 API calls 2 library calls 94142->94204 94143->94124 94145 67f725 94144->94145 94149 67f77a 94144->94149 94146 63f4ea 48 API calls 94145->94146 94148 67f747 94146->94148 94147 63f4ea 48 API calls 94147->94148 94148->94147 94148->94149 94150 680828 94149->94150 94151 680a53 Mailbox 94150->94151 94157 68084b _strcat _wcscpy __NMSG_WRITE 94150->94157 94151->94112 94152 62d286 48 API calls 94152->94157 94153 62cf93 58 API calls 94153->94157 94154 62936c 81 API calls 94154->94157 94155 64395c 47 API calls _W_store_winword 94155->94157 94157->94151 94157->94152 94157->94153 94157->94154 94157->94155 94207 668035 50 API calls __NMSG_WRITE 94157->94207 94160 63ed2d 94158->94160 94159 63edc5 VirtualProtect 94161 63ed93 94159->94161 94160->94159 94160->94161 94161->94115 94161->94116 94163 631cf6 94162->94163 94164 631ba2 94162->94164 94163->94130 94168 63f4ea 48 API calls 94164->94168 94177 631bae 94164->94177 94166 631c5d 94166->94130 94167 631bb9 94167->94166 94171 63f4ea 48 API calls 94167->94171 94169 6949c4 94168->94169 94170 63f4ea 48 API calls 94169->94170 94172 6949cf 94170->94172 94173 631c9f 94171->94173 94176 63f4ea 48 API calls 94172->94176 94172->94177 94174 631cb2 94173->94174 94208 622925 48 API calls 94173->94208 94174->94130 94176->94172 94177->94167 94209 63c15c 48 API calls 94177->94209 94179 680427 94178->94179 94184 680443 94178->94184 94181 6804f8 94179->94181 94182 68042e 94179->94182 94183 68044f 94179->94183 94179->94184 94180 68051e 94180->94130 94219 669dc5 103 API calls 94181->94219 94216 667c56 50 API calls _strlen 94182->94216 94218 62cdb9 48 API calls 94183->94218 94184->94180 94210 641c9d 94184->94210 94189 680438 94217 62cdb9 48 API calls 94189->94217 94191->94124 94192->94124 94193->94119 94194->94130 94195->94105 94197 661f3b __NMSG_WRITE 94196->94197 94198 661f79 94197->94198 94200 661f6f 94197->94200 94202 661ffa 94197->94202 94198->94137 94198->94142 94200->94198 94205 63d37a 60 API calls 94200->94205 94202->94198 94206 63d37a 60 API calls 94202->94206 94203->94140 94204->94143 94205->94200 94206->94202 94207->94157 94208->94174 94209->94167 94211 641ca6 RtlFreeHeap 94210->94211 94212 641ccf _free 94210->94212 94211->94212 94213 641cbb 94211->94213 94212->94180 94220 647c0e 47 API calls __getptd_noexit 94213->94220 94215 641cc1 GetLastError 94215->94212 94216->94189 94217->94184 94218->94184 94219->94184 94220->94215 94222 626b0f 48 API calls 94221->94222 94229 62b495 94222->94229 94223 62b69b 94252 62ba85 94223->94252 94225 62b6b5 Mailbox 94225->93995 94228 693939 ___crtGetEnvironmentStringsW 94262 6626bc 88 API calls 4 library calls 94228->94262 94229->94223 94229->94228 94230 69397b 94229->94230 94235 62ba85 48 API calls 94229->94235 94238 62bcce 48 API calls 94229->94238 94240 62b9e4 94229->94240 94241 693909 94229->94241 94242 62bb85 48 API calls 94229->94242 94246 62bdfa 48 API calls 94229->94246 94250 62c413 59 API calls 94229->94250 94251 62bc74 48 API calls 94229->94251 94260 62c6a5 49 API calls 94229->94260 94261 62c799 48 API calls ___crtGetEnvironmentStringsW 94229->94261 94263 6626bc 88 API calls 4 library calls 94230->94263 94234 693973 94234->94225 94235->94229 94237 693989 94239 62ba85 48 API calls 94237->94239 94238->94229 94239->94234 94264 6626bc 88 API calls 4 library calls 94240->94264 94243 626b4a 48 API calls 94241->94243 94242->94229 94245 693914 94243->94245 94248 63f4ea 48 API calls 94245->94248 94247 62b66c CharUpperBuffW 94246->94247 94247->94229 94248->94228 94249->93999 94250->94229 94251->94229 94253 62bb25 94252->94253 94258 62ba98 ___crtGetEnvironmentStringsW 94252->94258 94255 63f4ea 48 API calls 94253->94255 94254 63f4ea 48 API calls 94256 62ba9f 94254->94256 94255->94258 94257 63f4ea 48 API calls 94256->94257 94259 62bac8 94256->94259 94257->94259 94258->94254 94259->94225 94260->94229 94261->94229 94262->94234 94263->94237 94264->94234 94266 62d654 94265->94266 94274 62d67e 94265->94274 94267 62d65b 94266->94267 94271 62d6c2 94266->94271 94268 62d6ab 94267->94268 94269 62d666 94267->94269 94268->94274 94278 63dce0 53 API calls 94268->94278 94277 62d9a0 53 API calls __cinit 94269->94277 94271->94268 94279 63dce0 53 API calls 94271->94279 94274->94029 94275->94029 94276->94010 94277->94274 94278->94274 94279->94268 94280->94077 94281->94043 94282->94050 94284 634637 94283->94284 94285 63479f 94283->94285 94286 634643 94284->94286 94287 696e05 94284->94287 94288 62ce19 48 API calls 94285->94288 94427 634300 335 API calls ___crtGetEnvironmentStringsW 94286->94427 94290 67e822 335 API calls 94287->94290 94295 6346e4 Mailbox 94288->94295 94291 696e11 94290->94291 94292 634739 Mailbox 94291->94292 94428 66cc5c 86 API calls 4 library calls 94291->94428 94292->94077 94294 634659 94294->94291 94294->94292 94294->94295 94298 676ff0 335 API calls 94295->94298 94377 666524 94295->94377 94380 66fa0c 94295->94380 94421 624252 94295->94421 94298->94292 94300->94055 94301->94059 95416 62bd30 94302->95416 94304 633267 94305 69907a 94304->94305 94306 6332f8 94304->94306 94372 633628 94304->94372 95495 66cc5c 86 API calls 4 library calls 94305->95495 95489 63c36b 86 API calls 94306->95489 94310 6994df 94310->94372 95512 66cc5c 86 API calls 4 library calls 94310->95512 94312 633313 94312->94310 94322 6334eb Mailbox ___crtGetEnvironmentStringsW 94312->94322 94312->94372 95421 622b7a 94312->95421 94316 69926d 95504 66cc5c 86 API calls 4 library calls 94316->95504 94317 69909a 94319 62d645 53 API calls 94317->94319 94359 6991fa 94317->94359 94318 62fe30 335 API calls 94321 699407 94318->94321 94323 69910c 94319->94323 94332 62d6e9 55 API calls 94321->94332 94321->94372 94322->94316 94322->94317 94337 62fe30 335 API calls 94322->94337 94343 699438 94322->94343 94345 63c3c3 48 API calls 94322->94345 94356 63f4ea 48 API calls 94322->94356 94360 63351f 94322->94360 94362 699394 94322->94362 94366 6993c5 94322->94366 94322->94372 95491 62d9a0 53 API calls __cinit 94322->95491 95492 62d8c0 53 API calls 94322->95492 95493 63c2d6 48 API calls ___crtGetEnvironmentStringsW 94322->95493 95505 67cda2 82 API calls Mailbox 94322->95505 95506 6680e3 53 API calls 94322->95506 95507 62d764 55 API calls 94322->95507 95508 62dcae 50 API calls Mailbox 94322->95508 94326 699220 94323->94326 94327 699114 94323->94327 94324 6333ce 94324->94322 94329 633465 94324->94329 94330 69945e 94324->94330 95501 621caa 49 API calls 94326->95501 94338 699128 94327->94338 94344 699152 94327->94344 94335 63f4ea 48 API calls 94329->94335 95510 66c942 50 API calls 94330->95510 94332->94343 94352 63346c 94335->94352 94336 69923d 94340 69925e 94336->94340 94341 699252 94336->94341 94337->94322 95496 66cc5c 86 API calls 4 library calls 94338->95496 95503 66cc5c 86 API calls 4 library calls 94340->95503 95502 66cc5c 86 API calls 4 library calls 94341->95502 95509 66cc5c 86 API calls 4 library calls 94343->95509 94349 699177 94344->94349 94353 699195 94344->94353 94345->94322 95497 67f320 335 API calls 94349->95497 94352->94360 95428 62e8d0 94352->95428 94354 69918b 94353->94354 95498 67f5ee 335 API calls 94353->95498 94354->94372 95499 63c2d6 48 API calls ___crtGetEnvironmentStringsW 94354->95499 94356->94322 95500 66cc5c 86 API calls 4 library calls 94359->95500 94361 626eed 48 API calls 94360->94361 94364 633540 94360->94364 94361->94364 94363 63f4ea 48 API calls 94362->94363 94363->94366 94367 6994b0 94364->94367 94369 633585 94364->94369 94364->94372 94366->94318 95511 62dcae 50 API calls Mailbox 94367->95511 94369->94310 94370 633615 94369->94370 94369->94372 95490 62dcae 50 API calls Mailbox 94370->95490 94373 633635 Mailbox 94372->94373 95494 66cc5c 86 API calls 4 library calls 94372->95494 94373->94077 94374->94069 94375->94071 94376->94075 94429 666ca9 GetFileAttributesW 94377->94429 94381 66fa1c __ftell_nolock 94380->94381 94382 66fa44 94381->94382 94521 62d286 48 API calls 94381->94521 94384 62936c 81 API calls 94382->94384 94385 66fa5e 94384->94385 94386 66fa80 94385->94386 94387 66fb68 94385->94387 94396 66fb92 94385->94396 94388 62936c 81 API calls 94386->94388 94433 6241a9 94387->94433 94394 66fa8c _wcscpy _wcschr 94388->94394 94391 66fb8e 94393 62936c 81 API calls 94391->94393 94391->94396 94392 6241a9 136 API calls 94392->94391 94395 66fbc7 94393->94395 94400 66fab0 _wcscat _wcscpy 94394->94400 94404 66fade _wcscat 94394->94404 94457 641dfc 94395->94457 94396->94292 94398 62936c 81 API calls 94399 66fafc _wcscpy 94398->94399 94522 6672cb GetFileAttributesW 94399->94522 94402 62936c 81 API calls 94400->94402 94402->94404 94403 66fb1c __NMSG_WRITE 94403->94396 94406 62936c 81 API calls 94403->94406 94404->94398 94405 66fbeb _wcscat _wcscpy 94409 62936c 81 API calls 94405->94409 94407 66fb48 94406->94407 94523 6660dd 77 API calls 4 library calls 94407->94523 94411 66fc82 94409->94411 94410 66fb5c 94410->94396 94460 66690b 94411->94460 94413 66fca2 94414 666524 3 API calls 94413->94414 94415 66fcb1 94414->94415 94416 62936c 81 API calls 94415->94416 94419 66fce2 94415->94419 94417 66fccb 94416->94417 94466 66bfa4 94417->94466 94420 624252 84 API calls 94419->94420 94420->94396 94422 624263 94421->94422 94423 62425c 94421->94423 94425 624272 94422->94425 94426 624283 FreeLibrary 94422->94426 94424 6435e4 __fcloseall 83 API calls 94423->94424 94424->94422 94425->94292 94426->94425 94427->94294 94428->94292 94430 666529 94429->94430 94431 666cc4 FindFirstFileW 94429->94431 94430->94292 94431->94430 94432 666cd9 FindClose 94431->94432 94432->94430 94524 624214 94433->94524 94438 6241d4 LoadLibraryExW 94534 624291 94438->94534 94439 694f73 94441 624252 84 API calls 94439->94441 94443 694f7a 94441->94443 94445 624291 3 API calls 94443->94445 94447 694f82 94445->94447 94446 6241fb 94446->94447 94448 624207 94446->94448 94560 6244ed 94447->94560 94449 624252 84 API calls 94448->94449 94452 62420c 94449->94452 94452->94391 94452->94392 94454 694fa9 94568 624950 94454->94568 95038 641e46 94457->95038 94461 666918 _wcschr __ftell_nolock 94460->94461 94462 641dfc __wsplitpath 47 API calls 94461->94462 94465 66692e _wcscat _wcscpy 94461->94465 94463 66695d 94462->94463 94464 641dfc __wsplitpath 47 API calls 94463->94464 94464->94465 94465->94413 94467 66bfb1 __ftell_nolock 94466->94467 94468 63f4ea 48 API calls 94467->94468 94469 66c00e 94468->94469 94470 6247b7 48 API calls 94469->94470 94471 66c018 94470->94471 94472 66bdb4 GetSystemTimeAsFileTime 94471->94472 94473 66c023 94472->94473 94474 624517 83 API calls 94473->94474 94475 66c036 _wcscmp 94474->94475 94476 66c107 94475->94476 94477 66c05a 94475->94477 94478 66c56d 94 API calls 94476->94478 95094 66c56d 94477->95094 94494 66c0d3 _wcscat 94478->94494 94481 641dfc __wsplitpath 47 API calls 94486 66c088 _wcscat _wcscpy 94481->94486 94482 6244ed 64 API calls 94484 66c12c 94482->94484 94483 66c110 94483->94419 94485 6244ed 64 API calls 94484->94485 94487 66c13c 94485->94487 94489 641dfc __wsplitpath 47 API calls 94486->94489 94488 6244ed 64 API calls 94487->94488 94490 66c157 94488->94490 94489->94494 94491 6244ed 64 API calls 94490->94491 94492 66c167 94491->94492 94493 6244ed 64 API calls 94492->94493 94495 66c182 94493->94495 94494->94482 94494->94483 94496 6244ed 64 API calls 94495->94496 94497 66c192 94496->94497 94498 6244ed 64 API calls 94497->94498 94499 66c1a2 94498->94499 94500 6244ed 64 API calls 94499->94500 94501 66c1b2 94500->94501 95064 66c71a GetTempPathW GetTempFileNameW 94501->95064 94503 66c1be 94504 643499 117 API calls 94503->94504 94515 66c1cf 94504->94515 94505 66c289 95078 6435e4 94505->95078 94507 66c294 94509 66c2ae 94507->94509 94510 66c29a DeleteFileW 94507->94510 94508 6244ed 64 API calls 94508->94515 94511 66c342 CopyFileW 94509->94511 94516 66c2b8 94509->94516 94510->94483 94512 66c36a DeleteFileW 94511->94512 94513 66c358 DeleteFileW 94511->94513 95091 66c6d9 CreateFileW 94512->95091 94513->94483 94515->94483 94515->94505 94515->94508 95065 642aae 94515->95065 95100 66b965 94516->95100 94520 66c331 DeleteFileW 94520->94483 94521->94382 94522->94403 94523->94410 94573 624339 94524->94573 94527 62423c 94528 624244 FreeLibrary 94527->94528 94529 6241bb 94527->94529 94528->94529 94531 643499 94529->94531 94581 6434ae 94531->94581 94533 6241c8 94533->94438 94533->94439 94778 6242e4 94534->94778 94537 6242b8 94539 6242c1 FreeLibrary 94537->94539 94540 6241ec 94537->94540 94539->94540 94541 624380 94540->94541 94542 63f4ea 48 API calls 94541->94542 94543 624395 94542->94543 94544 6247b7 48 API calls 94543->94544 94545 6243a1 ___crtGetEnvironmentStringsW 94544->94545 94546 6243dc 94545->94546 94547 6244d1 94545->94547 94548 624499 94545->94548 94549 624950 57 API calls 94546->94549 94797 66c750 93 API calls 94547->94797 94786 62406b CreateStreamOnHGlobal 94548->94786 94557 6243e5 94549->94557 94552 6244ed 64 API calls 94552->94557 94553 624479 94553->94446 94555 694ed7 94556 624517 83 API calls 94555->94556 94558 694eeb 94556->94558 94557->94552 94557->94553 94557->94555 94792 624517 94557->94792 94559 6244ed 64 API calls 94558->94559 94559->94553 94561 694fc0 94560->94561 94562 6244ff 94560->94562 94821 64381e 94562->94821 94565 66bf5a 95015 66bdb4 94565->95015 94567 66bf70 94567->94454 94569 695002 94568->94569 94570 62495f 94568->94570 95020 643e65 94570->95020 94572 624967 94577 62434b 94573->94577 94576 624321 LoadLibraryA GetProcAddress 94576->94527 94578 62422f 94577->94578 94579 624354 LoadLibraryA 94577->94579 94578->94527 94578->94576 94579->94578 94580 624365 GetProcAddress 94579->94580 94580->94578 94582 6434ba __mtinitlocknum 94581->94582 94583 6434cd 94582->94583 94586 6434fe 94582->94586 94629 647c0e 47 API calls __getptd_noexit 94583->94629 94585 6434d2 94630 646e10 8 API calls __wcsnicmp 94585->94630 94600 64e4c8 94586->94600 94589 643503 94590 64350c 94589->94590 94591 643519 94589->94591 94631 647c0e 47 API calls __getptd_noexit 94590->94631 94593 643543 94591->94593 94594 643523 94591->94594 94614 64e5e0 94593->94614 94632 647c0e 47 API calls __getptd_noexit 94594->94632 94595 6434dd __mtinitlocknum @_EH4_CallFilterFunc@8 94595->94533 94601 64e4d4 __mtinitlocknum 94600->94601 94634 647cf4 94601->94634 94603 64e559 94669 6469d0 94603->94669 94607 64e5cc __mtinitlocknum 94607->94589 94608 64e56f InitializeCriticalSectionAndSpinCount EnterCriticalSection 94612 64e552 94608->94612 94609 64e4e2 94609->94603 94609->94612 94644 647d7c 94609->94644 94667 644e5b 48 API calls __lock 94609->94667 94668 644ec5 LeaveCriticalSection LeaveCriticalSection _doexit 94609->94668 94641 64e5d7 94612->94641 94622 64e600 __wopenfile 94614->94622 94615 64e61a 94685 647c0e 47 API calls __getptd_noexit 94615->94685 94617 64e61f 94686 646e10 8 API calls __wcsnicmp 94617->94686 94619 64e838 94682 6563c9 94619->94682 94620 64354e 94633 643570 LeaveCriticalSection LeaveCriticalSection _fseek 94620->94633 94622->94615 94628 64e7d5 94622->94628 94687 64185b 59 API calls 3 library calls 94622->94687 94624 64e7ce 94624->94628 94688 64185b 59 API calls 3 library calls 94624->94688 94626 64e7ed 94626->94628 94689 64185b 59 API calls 3 library calls 94626->94689 94628->94615 94628->94619 94629->94585 94630->94595 94631->94595 94632->94595 94633->94595 94635 647d05 94634->94635 94636 647d18 EnterCriticalSection 94634->94636 94637 647d7c __mtinitlocknum 46 API calls 94635->94637 94636->94609 94638 647d0b 94637->94638 94638->94636 94675 64115b 47 API calls 3 library calls 94638->94675 94676 647e58 LeaveCriticalSection 94641->94676 94643 64e5de 94643->94607 94645 647d88 __mtinitlocknum 94644->94645 94646 647d91 94645->94646 94647 647da9 94645->94647 94677 6481c2 47 API calls __NMSG_WRITE 94646->94677 94650 647dc9 __mtinitlocknum 94647->94650 94651 6469d0 __malloc_crt 46 API calls 94647->94651 94649 647d96 94678 64821f 47 API calls 5 library calls 94649->94678 94650->94609 94653 647dbd 94651->94653 94655 647dc4 94653->94655 94656 647dd3 94653->94656 94654 647d9d 94679 641145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 94654->94679 94680 647c0e 47 API calls __getptd_noexit 94655->94680 94657 647cf4 __lock 46 API calls 94656->94657 94660 647dda 94657->94660 94662 647dfe 94660->94662 94663 647de9 InitializeCriticalSectionAndSpinCount 94660->94663 94665 641c9d _free 46 API calls 94662->94665 94664 647e04 94663->94664 94681 647e1a LeaveCriticalSection _doexit 94664->94681 94665->94664 94667->94609 94668->94609 94672 6469de 94669->94672 94670 64395c _W_store_winword 46 API calls 94670->94672 94671 646a12 94671->94608 94671->94612 94672->94670 94672->94671 94673 6469f1 Sleep 94672->94673 94674 646a0a 94673->94674 94674->94671 94674->94672 94676->94643 94677->94649 94678->94654 94680->94650 94681->94650 94690 655bb1 94682->94690 94684 6563e2 94684->94620 94685->94617 94686->94620 94687->94624 94688->94626 94689->94628 94691 655bbd __mtinitlocknum 94690->94691 94692 655bcf 94691->94692 94695 655c06 94691->94695 94775 647c0e 47 API calls __getptd_noexit 94692->94775 94694 655bd4 94776 646e10 8 API calls __wcsnicmp 94694->94776 94701 655c78 94695->94701 94698 655c23 94777 655c4c LeaveCriticalSection __unlock_fhandle 94698->94777 94700 655bde __mtinitlocknum 94700->94684 94702 655c98 94701->94702 94703 64273b __wsopen_helper 47 API calls 94702->94703 94707 655cb4 94703->94707 94704 655deb 94705 646e20 __invoke_watson 8 API calls 94704->94705 94706 6563c8 94705->94706 94709 655bb1 __wsopen_helper 104 API calls 94706->94709 94707->94704 94708 655cee 94707->94708 94720 655d11 94707->94720 94710 647bda __free_osfhnd 47 API calls 94708->94710 94711 6563e2 94709->94711 94712 655cf3 94710->94712 94711->94698 94713 647c0e ___libm_error_support 47 API calls 94712->94713 94714 655d00 94713->94714 94716 646e10 __wcsnicmp 8 API calls 94714->94716 94715 655dcf 94717 647bda __free_osfhnd 47 API calls 94715->94717 94718 655d0a 94716->94718 94719 655dd4 94717->94719 94718->94698 94721 647c0e ___libm_error_support 47 API calls 94719->94721 94720->94715 94724 655dad 94720->94724 94722 655de1 94721->94722 94723 646e10 __wcsnicmp 8 API calls 94722->94723 94723->94704 94725 64a979 __wsopen_helper 52 API calls 94724->94725 94726 655e7b 94725->94726 94727 655e85 94726->94727 94728 655ea6 94726->94728 94729 647bda __free_osfhnd 47 API calls 94727->94729 94730 655b20 ___createFile GetModuleHandleW GetProcAddress CreateFileW 94728->94730 94731 655e8a 94729->94731 94741 655ec8 94730->94741 94732 647c0e ___libm_error_support 47 API calls 94731->94732 94734 655e94 94732->94734 94733 655f46 GetFileType 94735 655f51 GetLastError 94733->94735 94736 655f93 94733->94736 94739 647c0e ___libm_error_support 47 API calls 94734->94739 94740 647bed __dosmaperr 47 API calls 94735->94740 94745 64ac0b __set_osfhnd 48 API calls 94736->94745 94737 655f14 GetLastError 94738 647bed __dosmaperr 47 API calls 94737->94738 94742 655f39 94738->94742 94739->94718 94743 655f78 CloseHandle 94740->94743 94741->94733 94741->94737 94744 655b20 ___createFile GetModuleHandleW GetProcAddress CreateFileW 94741->94744 94748 647c0e ___libm_error_support 47 API calls 94742->94748 94743->94742 94746 655f86 94743->94746 94747 655f09 94744->94747 94752 655fb1 94745->94752 94749 647c0e ___libm_error_support 47 API calls 94746->94749 94747->94733 94747->94737 94748->94704 94750 655f8b 94749->94750 94750->94742 94751 65616c 94751->94704 94754 65633f CloseHandle 94751->94754 94752->94751 94753 64f82f __lseeki64_nolock 49 API calls 94752->94753 94769 656032 94752->94769 94755 65601b 94753->94755 94756 655b20 ___createFile GetModuleHandleW GetProcAddress CreateFileW 94754->94756 94758 647bda __free_osfhnd 47 API calls 94755->94758 94755->94769 94757 656366 94756->94757 94759 65639a 94757->94759 94760 65636e GetLastError 94757->94760 94758->94769 94759->94704 94761 647bed __dosmaperr 47 API calls 94760->94761 94763 65637a 94761->94763 94762 656064 94766 656f40 __chsize_nolock 81 API calls 94762->94766 94762->94769 94767 64ab1e __free_osfhnd 48 API calls 94763->94767 94764 64ea9c __close_nolock 50 API calls 94764->94769 94765 64ee0e 59 API calls __filbuf 94765->94769 94766->94762 94767->94759 94768 64af61 __flush 78 API calls 94768->94769 94769->94751 94769->94762 94769->94764 94769->94765 94769->94768 94770 6561e9 94769->94770 94773 64f82f 49 API calls __lseeki64_nolock 94769->94773 94771 64ea9c __close_nolock 50 API calls 94770->94771 94772 6561f0 94771->94772 94774 647c0e ___libm_error_support 47 API calls 94772->94774 94773->94769 94774->94704 94775->94694 94776->94700 94777->94700 94782 6242f6 94778->94782 94781 6242cc LoadLibraryA GetProcAddress 94781->94537 94783 6242aa 94782->94783 94784 6242ff LoadLibraryA 94782->94784 94783->94537 94783->94781 94784->94783 94785 624310 GetProcAddress 94784->94785 94785->94783 94787 624085 FindResourceExW 94786->94787 94791 6240a2 94786->94791 94788 694f16 LoadResource 94787->94788 94787->94791 94789 694f2b SizeofResource 94788->94789 94788->94791 94790 694f3f LockResource 94789->94790 94789->94791 94790->94791 94791->94546 94793 624526 94792->94793 94794 694fe0 94792->94794 94798 643a8d 94793->94798 94796 624534 94796->94557 94797->94546 94799 643a99 __mtinitlocknum 94798->94799 94800 643aa7 94799->94800 94801 643acd 94799->94801 94811 647c0e 47 API calls __getptd_noexit 94800->94811 94813 644e1c 94801->94813 94804 643aac 94812 646e10 8 API calls __wcsnicmp 94804->94812 94808 643ae2 94820 643b04 LeaveCriticalSection LeaveCriticalSection _fseek 94808->94820 94810 643ab7 __mtinitlocknum 94810->94796 94811->94804 94812->94810 94814 644e2c 94813->94814 94815 644e4e EnterCriticalSection 94813->94815 94814->94815 94816 644e34 94814->94816 94817 643ad3 94815->94817 94818 647cf4 __lock 47 API calls 94816->94818 94819 6439fe 81 API calls 4 library calls 94817->94819 94818->94817 94819->94808 94820->94810 94824 643839 94821->94824 94823 624510 94823->94565 94825 643845 __mtinitlocknum 94824->94825 94826 643880 __mtinitlocknum 94825->94826 94827 643888 94825->94827 94828 64385b _memset 94825->94828 94826->94823 94829 644e1c __lock_file 48 API calls 94827->94829 94851 647c0e 47 API calls __getptd_noexit 94828->94851 94831 64388e 94829->94831 94837 64365b 94831->94837 94832 643875 94852 646e10 8 API calls __wcsnicmp 94832->94852 94838 643691 94837->94838 94842 643676 _memset 94837->94842 94853 6438c2 LeaveCriticalSection LeaveCriticalSection _fseek 94838->94853 94839 643681 94949 647c0e 47 API calls __getptd_noexit 94839->94949 94841 643686 94950 646e10 8 API calls __wcsnicmp 94841->94950 94842->94838 94842->94839 94846 6436cf 94842->94846 94845 6437e0 _memset 94952 647c0e 47 API calls __getptd_noexit 94845->94952 94846->94838 94846->94845 94854 642933 94846->94854 94861 64ee0e 94846->94861 94929 64eb66 94846->94929 94951 64ec87 47 API calls 4 library calls 94846->94951 94851->94832 94852->94826 94853->94826 94855 642952 94854->94855 94856 64293d 94854->94856 94855->94846 94953 647c0e 47 API calls __getptd_noexit 94856->94953 94858 642942 94954 646e10 8 API calls __wcsnicmp 94858->94954 94860 64294d 94860->94846 94862 64ee46 94861->94862 94863 64ee2f 94861->94863 94864 64f57e 94862->94864 94869 64ee80 94862->94869 94964 647bda 47 API calls __getptd_noexit 94863->94964 94979 647bda 47 API calls __getptd_noexit 94864->94979 94867 64ee34 94965 647c0e 47 API calls __getptd_noexit 94867->94965 94871 64ee88 94869->94871 94878 64ee9f 94869->94878 94870 64f583 94980 647c0e 47 API calls __getptd_noexit 94870->94980 94966 647bda 47 API calls __getptd_noexit 94871->94966 94874 64ee94 94981 646e10 8 API calls __wcsnicmp 94874->94981 94875 64ee8d 94967 647c0e 47 API calls __getptd_noexit 94875->94967 94877 64eeb4 94968 647bda 47 API calls __getptd_noexit 94877->94968 94878->94877 94880 64eece 94878->94880 94882 64eeec 94878->94882 94909 64ee3b 94878->94909 94880->94877 94885 64eed9 94880->94885 94883 6469d0 __malloc_crt 47 API calls 94882->94883 94886 64eefc 94883->94886 94955 653bf2 94885->94955 94888 64ef04 94886->94888 94889 64ef1f 94886->94889 94887 64efed 94890 64f066 ReadFile 94887->94890 94893 64f003 GetConsoleMode 94887->94893 94969 647c0e 47 API calls __getptd_noexit 94888->94969 94971 64f82f 49 API calls 3 library calls 94889->94971 94894 64f546 GetLastError 94890->94894 94895 64f088 94890->94895 94900 64f017 94893->94900 94901 64f063 94893->94901 94897 64f553 94894->94897 94898 64f046 94894->94898 94895->94894 94903 64f058 94895->94903 94896 64ef09 94970 647bda 47 API calls __getptd_noexit 94896->94970 94977 647c0e 47 API calls __getptd_noexit 94897->94977 94913 64f04c 94898->94913 94972 647bed 47 API calls 3 library calls 94898->94972 94900->94901 94904 64f01d ReadConsoleW 94900->94904 94901->94890 94911 64f32a 94903->94911 94912 64f0bd 94903->94912 94903->94913 94904->94903 94906 64f040 GetLastError 94904->94906 94905 64f558 94978 647bda 47 API calls __getptd_noexit 94905->94978 94906->94898 94909->94846 94910 641c9d _free 47 API calls 94910->94909 94911->94913 94920 64f430 ReadFile 94911->94920 94915 64f1aa 94912->94915 94916 64f129 ReadFile 94912->94916 94913->94909 94913->94910 94915->94913 94918 64f267 94915->94918 94919 64f257 94915->94919 94923 64f217 MultiByteToWideChar 94915->94923 94917 64f14a GetLastError 94916->94917 94928 64f154 94916->94928 94917->94928 94918->94923 94975 64f82f 49 API calls 3 library calls 94918->94975 94974 647c0e 47 API calls __getptd_noexit 94919->94974 94922 64f453 GetLastError 94920->94922 94927 64f461 94920->94927 94922->94927 94923->94906 94923->94913 94927->94911 94976 64f82f 49 API calls 3 library calls 94927->94976 94928->94912 94973 64f82f 49 API calls 3 library calls 94928->94973 94930 64eb71 94929->94930 94933 64eb86 94929->94933 95012 647c0e 47 API calls __getptd_noexit 94930->95012 94932 64eb76 95013 646e10 8 API calls __wcsnicmp 94932->95013 94935 64ebbb 94933->94935 94942 64eb81 94933->94942 95014 653e24 47 API calls __malloc_crt 94933->95014 94937 642933 __fseek_nolock 47 API calls 94935->94937 94938 64ebcf 94937->94938 94982 64ed06 94938->94982 94940 64ebd6 94941 642933 __fseek_nolock 47 API calls 94940->94941 94940->94942 94943 64ebf9 94941->94943 94942->94846 94943->94942 94944 642933 __fseek_nolock 47 API calls 94943->94944 94945 64ec05 94944->94945 94945->94942 94946 642933 __fseek_nolock 47 API calls 94945->94946 94947 64ec12 94946->94947 94948 642933 __fseek_nolock 47 API calls 94947->94948 94948->94942 94949->94841 94950->94838 94951->94846 94952->94841 94953->94858 94954->94860 94956 653bfd 94955->94956 94957 653c0a 94955->94957 94958 647c0e ___libm_error_support 47 API calls 94956->94958 94959 653c16 94957->94959 94960 647c0e ___libm_error_support 47 API calls 94957->94960 94961 653c02 94958->94961 94959->94887 94962 653c37 94960->94962 94961->94887 94963 646e10 __wcsnicmp 8 API calls 94962->94963 94963->94961 94964->94867 94965->94909 94966->94875 94967->94874 94968->94875 94969->94896 94970->94909 94971->94885 94972->94913 94973->94928 94974->94913 94975->94923 94976->94927 94977->94905 94978->94913 94979->94870 94980->94874 94981->94909 94983 64ed12 __mtinitlocknum 94982->94983 94984 64ed32 94983->94984 94985 64ed1a 94983->94985 94987 64eded 94984->94987 94991 64ed68 94984->94991 94986 647bda __free_osfhnd 47 API calls 94985->94986 94988 64ed1f 94986->94988 94989 647bda __free_osfhnd 47 API calls 94987->94989 94990 647c0e ___libm_error_support 47 API calls 94988->94990 94992 64edf2 94989->94992 94993 64ed27 __mtinitlocknum 94990->94993 94994 64ed75 94991->94994 94995 64ed8a 94991->94995 94996 647c0e ___libm_error_support 47 API calls 94992->94996 94993->94940 94997 647bda __free_osfhnd 47 API calls 94994->94997 94998 64a8ed ___lock_fhandle 49 API calls 94995->94998 95007 64ed82 94996->95007 94999 64ed7a 94997->94999 95000 64ed90 94998->95000 95004 647c0e ___libm_error_support 47 API calls 94999->95004 95001 64edb6 95000->95001 95002 64eda3 95000->95002 95006 647c0e ___libm_error_support 47 API calls 95001->95006 95005 64ee0e __filbuf 59 API calls 95002->95005 95003 646e10 __wcsnicmp 8 API calls 95003->94993 95004->95007 95008 64edaf 95005->95008 95009 64edbb 95006->95009 95007->95003 95011 64ede5 __filbuf LeaveCriticalSection 95008->95011 95010 647bda __free_osfhnd 47 API calls 95009->95010 95010->95008 95011->94993 95012->94932 95013->94942 95014->94935 95018 64344a GetSystemTimeAsFileTime 95015->95018 95017 66bdc3 95017->94567 95019 643478 __aulldiv 95018->95019 95019->95017 95021 643e71 __mtinitlocknum 95020->95021 95022 643e94 95021->95022 95023 643e7f 95021->95023 95025 644e1c __lock_file 48 API calls 95022->95025 95034 647c0e 47 API calls __getptd_noexit 95023->95034 95027 643e9a 95025->95027 95026 643e84 95035 646e10 8 API calls __wcsnicmp 95026->95035 95036 643b0c 55 API calls 6 library calls 95027->95036 95030 643ea5 95037 643ec5 LeaveCriticalSection LeaveCriticalSection _fseek 95030->95037 95032 643eb7 95033 643e8f __mtinitlocknum 95032->95033 95033->94572 95034->95026 95035->95033 95036->95030 95037->95032 95039 641e61 95038->95039 95042 641e55 95038->95042 95062 647c0e 47 API calls __getptd_noexit 95039->95062 95041 642019 95043 641e41 95041->95043 95063 646e10 8 API calls __wcsnicmp 95041->95063 95042->95039 95046 641ed4 95042->95046 95057 649d6b 47 API calls 2 library calls 95042->95057 95043->94405 95046->95039 95050 641f41 95046->95050 95058 649d6b 47 API calls 2 library calls 95046->95058 95047 641fa0 95047->95039 95047->95043 95048 641fb0 95047->95048 95061 649d6b 47 API calls 2 library calls 95048->95061 95049 641f7b 95049->95039 95049->95043 95053 641f91 95049->95053 95050->95047 95052 641f5f 95050->95052 95052->95039 95052->95049 95059 649d6b 47 API calls 2 library calls 95052->95059 95060 649d6b 47 API calls 2 library calls 95053->95060 95057->95046 95058->95050 95059->95049 95060->95043 95061->95043 95062->95041 95063->95043 95064->94503 95066 642aba __mtinitlocknum 95065->95066 95067 642ad4 95066->95067 95068 642aec 95066->95068 95070 642ae4 __mtinitlocknum 95066->95070 95143 647c0e 47 API calls __getptd_noexit 95067->95143 95071 644e1c __lock_file 48 API calls 95068->95071 95070->94515 95073 642af2 95071->95073 95072 642ad9 95144 646e10 8 API calls __wcsnicmp 95072->95144 95131 642957 95073->95131 95079 6435f0 __mtinitlocknum 95078->95079 95080 643604 95079->95080 95081 64361c 95079->95081 95300 647c0e 47 API calls __getptd_noexit 95080->95300 95083 644e1c __lock_file 48 API calls 95081->95083 95088 643614 __mtinitlocknum 95081->95088 95085 64362e 95083->95085 95084 643609 95301 646e10 8 API calls __wcsnicmp 95084->95301 95284 643578 95085->95284 95088->94507 95092 66c715 95091->95092 95093 66c6ff SetFileTime CloseHandle 95091->95093 95092->94483 95093->95092 95098 66c581 __tzset_nolock _wcscmp 95094->95098 95095 66c05f 95095->94481 95095->94483 95096 6244ed 64 API calls 95096->95098 95097 66bf5a GetSystemTimeAsFileTime 95097->95098 95098->95095 95098->95096 95098->95097 95099 624517 83 API calls 95098->95099 95099->95098 95101 66b970 95100->95101 95102 66b97e 95100->95102 95103 643499 117 API calls 95101->95103 95104 66b9c3 95102->95104 95105 643499 117 API calls 95102->95105 95126 66b987 95102->95126 95103->95102 95374 66bbe8 95104->95374 95107 66b9a8 95105->95107 95107->95104 95109 66b9b1 95107->95109 95109->95126 95126->94512 95126->94520 95134 642966 95131->95134 95137 642984 95131->95137 95132 642974 95171 647c0e 47 API calls __getptd_noexit 95132->95171 95134->95132 95134->95137 95138 64299c ___crtGetEnvironmentStringsW 95134->95138 95135 642979 95172 646e10 8 API calls __wcsnicmp 95135->95172 95145 642b24 LeaveCriticalSection LeaveCriticalSection _fseek 95137->95145 95138->95137 95141 642933 __fseek_nolock 47 API calls 95138->95141 95146 64af61 95138->95146 95173 642c84 95138->95173 95179 648e63 78 API calls 7 library calls 95138->95179 95141->95138 95143->95072 95144->95070 95145->95070 95147 64af6d __mtinitlocknum 95146->95147 95148 64af75 95147->95148 95149 64af8d 95147->95149 95253 647bda 47 API calls __getptd_noexit 95148->95253 95151 64b022 95149->95151 95155 64afbf 95149->95155 95180 64a8ed 95155->95180 95171->95135 95172->95137 95174 642c97 95173->95174 95178 642cbb 95173->95178 95175 642933 __fseek_nolock 47 API calls 95174->95175 95174->95178 95176 642cb4 95175->95176 95178->95138 95179->95138 95285 643587 95284->95285 95286 64359b 95284->95286 95330 647c0e 47 API calls __getptd_noexit 95285->95330 95288 642c84 __flush 78 API calls 95286->95288 95298 643597 95286->95298 95291 6435a7 95288->95291 95289 64358c 95331 646e10 8 API calls __wcsnicmp 95289->95331 95303 64eb36 95291->95303 95302 643653 LeaveCriticalSection LeaveCriticalSection _fseek 95298->95302 95300->95084 95301->95088 95302->95088 95304 64eb43 95303->95304 95306 6435af 95303->95306 95304->95306 95330->95289 95331->95298 95417 62bd3f 95416->95417 95420 62bd5a 95416->95420 95418 62bdfa 48 API calls 95417->95418 95419 62bd47 CharUpperBuffW 95418->95419 95419->95420 95420->94304 95422 69436a 95421->95422 95423 622b8b 95421->95423 95424 63f4ea 48 API calls 95423->95424 95425 622b92 95424->95425 95426 622bb3 95425->95426 95513 622bce 48 API calls 95425->95513 95426->94324 95429 62e8f6 95428->95429 95488 62e906 Mailbox 95428->95488 95430 62ed52 95429->95430 95429->95488 95597 63e3cd 335 API calls 95430->95597 95432 62ebdd 95432->94322 95434 62ed63 95434->95432 95435 62ed70 95434->95435 95599 63e312 335 API calls Mailbox 95435->95599 95436 62e94c PeekMessageW 95436->95488 95438 62ed77 LockWindowUpdate DestroyWindow GetMessageW 95438->95432 95441 62eda9 95438->95441 95439 69526e Sleep 95439->95488 95443 6959ef TranslateMessage DispatchMessageW GetMessageW 95441->95443 95442 62ebc7 95442->95432 95598 622ff6 16 API calls 95442->95598 95443->95443 95445 695a1f 95443->95445 95445->95432 95446 62ed21 PeekMessageW 95446->95488 95447 62ebf7 timeGetTime 95447->95488 95449 63f4ea 48 API calls 95449->95488 95450 626eed 48 API calls 95450->95488 95451 62ed3a TranslateMessage DispatchMessageW 95451->95446 95452 695557 WaitForSingleObject 95453 695574 GetExitCodeProcess CloseHandle 95452->95453 95452->95488 95453->95488 95454 62d7f7 48 API calls 95483 695429 Mailbox 95454->95483 95455 69588f Sleep 95455->95483 95456 62edae timeGetTime 95600 621caa 49 API calls 95456->95600 95457 695733 Sleep 95457->95483 95458 63dc38 timeGetTime 95458->95483 95462 695926 GetExitCodeProcess 95465 69593c WaitForSingleObject 95462->95465 95466 695952 CloseHandle 95462->95466 95464 622aae 311 API calls 95464->95488 95465->95466 95465->95488 95466->95483 95467 695445 Sleep 95467->95488 95468 695432 Sleep 95468->95467 95469 688c4b 108 API calls 95469->95483 95470 622c79 107 API calls 95470->95483 95472 6959ae Sleep 95472->95488 95473 621caa 49 API calls 95473->95488 95474 62ce19 48 API calls 95474->95483 95478 62d6e9 55 API calls 95478->95483 95479 62fe30 311 API calls 95479->95488 95481 6345e0 311 API calls 95481->95488 95482 633200 311 API calls 95482->95488 95483->95454 95483->95458 95483->95462 95483->95467 95483->95468 95483->95469 95483->95470 95483->95472 95483->95474 95483->95478 95483->95488 95602 664cbe 49 API calls Mailbox 95483->95602 95603 621caa 49 API calls 95483->95603 95604 622aae 335 API calls 95483->95604 95605 67ccb2 50 API calls 95483->95605 95606 667a58 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 95483->95606 95607 666532 63 API calls 3 library calls 95483->95607 95485 62d6e9 55 API calls 95485->95488 95486 66cc5c 86 API calls 95486->95488 95487 62ce19 48 API calls 95487->95488 95488->95436 95488->95439 95488->95442 95488->95446 95488->95447 95488->95449 95488->95450 95488->95451 95488->95452 95488->95455 95488->95456 95488->95457 95488->95464 95488->95467 95488->95473 95488->95479 95488->95481 95488->95482 95488->95483 95488->95485 95488->95486 95488->95487 95514 62ef00 95488->95514 95521 62f110 95488->95521 95586 63e244 95488->95586 95591 63dc5f 95488->95591 95596 62eed0 335 API calls Mailbox 95488->95596 95601 688d23 48 API calls 95488->95601 95489->94312 95490->94372 95491->94322 95492->94322 95493->94322 95494->94373 95495->94312 95496->94372 95497->94354 95498->94354 95499->94359 95500->94372 95501->94336 95502->94372 95503->94372 95504->94372 95505->94322 95506->94322 95507->94322 95508->94322 95509->94372 95510->94360 95511->94310 95512->94372 95513->95426 95515 62ef2f 95514->95515 95516 62ef1d 95514->95516 95609 66cc5c 86 API calls 4 library calls 95515->95609 95608 62e3b0 335 API calls 2 library calls 95516->95608 95518 62ef26 95518->95488 95520 6986f9 95520->95520 95522 62f130 95521->95522 95525 62fe30 335 API calls 95522->95525 95529 62f199 95522->95529 95523 62f3dd 95526 6987c8 95523->95526 95535 62f3f2 95523->95535 95573 62f431 Mailbox 95523->95573 95524 62f595 95530 62d7f7 48 API calls 95524->95530 95524->95573 95527 698728 95525->95527 95614 66cc5c 86 API calls 4 library calls 95526->95614 95527->95529 95611 66cc5c 86 API calls 4 library calls 95527->95611 95529->95523 95529->95524 95533 62d7f7 48 API calls 95529->95533 95565 62f229 95529->95565 95532 6987a3 95530->95532 95613 640f0a 52 API calls __cinit 95532->95613 95537 698772 95533->95537 95564 62f418 95535->95564 95615 669af1 48 API calls 95535->95615 95536 698b1b 95555 698b2c 95536->95555 95556 698bcf 95536->95556 95612 640f0a 52 API calls __cinit 95537->95612 95539 62f770 95543 698a45 95539->95543 95562 62f77a 95539->95562 95541 62d6e9 55 API calls 95541->95573 95542 698b7e 95624 67e40a 335 API calls Mailbox 95542->95624 95621 63c1af 48 API calls 95543->95621 95544 698c53 95629 66cc5c 86 API calls 4 library calls 95544->95629 95545 698810 95616 67eef8 335 API calls 95545->95616 95546 62fe30 335 API calls 95567 62f6aa 95546->95567 95547 66cc5c 86 API calls 95547->95573 95548 698beb 95627 67bdbd 335 API calls Mailbox 95548->95627 95550 62fe30 335 API calls 95550->95573 95623 67f5ee 335 API calls 95555->95623 95626 66cc5c 86 API calls 4 library calls 95556->95626 95559 631b90 48 API calls 95559->95573 95560 631b90 48 API calls 95560->95573 95562->95559 95563 698c00 95585 62f537 Mailbox 95563->95585 95628 66cc5c 86 API calls 4 library calls 95563->95628 95564->95536 95564->95567 95564->95573 95565->95523 95565->95524 95565->95564 95565->95573 95566 62fce0 95566->95585 95625 66cc5c 86 API calls 4 library calls 95566->95625 95567->95539 95567->95546 95567->95566 95567->95573 95567->95585 95569 698823 95569->95564 95572 69884b 95569->95572 95617 67ccdc 48 API calls 95572->95617 95573->95541 95573->95542 95573->95544 95573->95547 95573->95548 95573->95550 95573->95560 95573->95566 95573->95585 95610 62dd47 48 API calls ___crtGetEnvironmentStringsW 95573->95610 95622 6597ed InterlockedDecrement 95573->95622 95630 63c1af 48 API calls 95573->95630 95575 698857 95577 6988aa 95575->95577 95578 698865 95575->95578 95582 6988a0 Mailbox 95577->95582 95619 66a69d 48 API calls 95577->95619 95618 669b72 48 API calls 95578->95618 95579 62fe30 335 API calls 95579->95585 95582->95579 95583 6988e7 95620 62bc74 48 API calls 95583->95620 95585->95488 95587 63e253 95586->95587 95588 69df42 95586->95588 95587->95488 95589 69df77 95588->95589 95590 69df59 TranslateAcceleratorW 95588->95590 95590->95587 95592 63dca3 95591->95592 95594 63dc71 95591->95594 95592->95488 95593 63dc96 IsDialogMessageW 95593->95592 95593->95594 95594->95592 95594->95593 95595 69dd1d GetClassLongW 95594->95595 95595->95593 95595->95594 95596->95488 95597->95442 95598->95434 95599->95438 95600->95488 95601->95488 95602->95483 95603->95483 95604->95483 95605->95483 95606->95483 95607->95483 95608->95518 95609->95520 95610->95573 95611->95529 95612->95565 95613->95573 95614->95585 95615->95545 95616->95569 95617->95575 95618->95582 95619->95583 95620->95582 95621->95573 95622->95573 95623->95573 95624->95566 95625->95585 95626->95585 95627->95563 95628->95585 95629->95585 95630->95573 95631 645dfd 95632 645e09 __mtinitlocknum 95631->95632 95668 647eeb GetStartupInfoW 95632->95668 95635 645e66 95637 645e71 95635->95637 95752 645f4d 47 API calls 3 library calls 95635->95752 95636 645e0e 95670 649ca7 GetProcessHeap 95636->95670 95671 647b47 95637->95671 95640 645e77 95641 645e82 __RTC_Initialize 95640->95641 95753 645f4d 47 API calls 3 library calls 95640->95753 95692 64acb3 95641->95692 95644 645e91 95645 645e9d GetCommandLineW 95644->95645 95754 645f4d 47 API calls 3 library calls 95644->95754 95711 652e7d GetEnvironmentStringsW 95645->95711 95648 645e9c 95648->95645 95651 645eb7 95652 645ec2 95651->95652 95755 64115b 47 API calls 3 library calls 95651->95755 95721 652cb4 95652->95721 95655 645ec8 95656 645ed3 95655->95656 95756 64115b 47 API calls 3 library calls 95655->95756 95735 641195 95656->95735 95659 645edb 95660 645ee6 __wwincmdln 95659->95660 95757 64115b 47 API calls 3 library calls 95659->95757 95739 623a0f 95660->95739 95669 647f01 95668->95669 95669->95636 95670->95635 95760 64123a 30 API calls 2 library calls 95671->95760 95673 647b4c 95761 647e23 InitializeCriticalSectionAndSpinCount 95673->95761 95675 647b51 95676 647b55 95675->95676 95763 647e6d TlsAlloc 95675->95763 95762 647bbd 50 API calls 2 library calls 95676->95762 95679 647b5a 95679->95640 95680 647b67 95680->95676 95681 647b72 95680->95681 95764 646986 95681->95764 95684 647bb4 95772 647bbd 50 API calls 2 library calls 95684->95772 95687 647b93 95687->95684 95689 647b99 95687->95689 95688 647bb9 95688->95640 95771 647a94 47 API calls 4 library calls 95689->95771 95691 647ba1 GetCurrentThreadId 95691->95640 95693 64acbf __mtinitlocknum 95692->95693 95694 647cf4 __lock 47 API calls 95693->95694 95695 64acc6 95694->95695 95696 646986 __calloc_crt 47 API calls 95695->95696 95697 64acd7 95696->95697 95698 64ad42 GetStartupInfoW 95697->95698 95699 64ace2 __mtinitlocknum @_EH4_CallFilterFunc@8 95697->95699 95700 64ad57 95698->95700 95703 64ae80 95698->95703 95699->95644 95700->95703 95705 646986 __calloc_crt 47 API calls 95700->95705 95707 64ada5 95700->95707 95701 64af44 95781 64af58 LeaveCriticalSection _doexit 95701->95781 95703->95701 95704 64aec9 GetStdHandle 95703->95704 95706 64aedb GetFileType 95703->95706 95708 64af08 InitializeCriticalSectionAndSpinCount 95703->95708 95704->95703 95705->95700 95706->95703 95707->95703 95709 64ade5 InitializeCriticalSectionAndSpinCount 95707->95709 95710 64add7 GetFileType 95707->95710 95708->95703 95709->95707 95710->95707 95710->95709 95712 645ead 95711->95712 95713 652e8e 95711->95713 95717 652a7b GetModuleFileNameW 95712->95717 95714 6469d0 __malloc_crt 47 API calls 95713->95714 95716 652eb4 ___crtGetEnvironmentStringsW 95714->95716 95715 652eca FreeEnvironmentStringsW 95715->95712 95716->95715 95718 652aaf _wparse_cmdline 95717->95718 95719 6469d0 __malloc_crt 47 API calls 95718->95719 95720 652aef _wparse_cmdline 95718->95720 95719->95720 95720->95651 95722 652cc5 95721->95722 95723 652ccd __NMSG_WRITE 95721->95723 95722->95655 95724 646986 __calloc_crt 47 API calls 95723->95724 95725 652cf6 __NMSG_WRITE 95724->95725 95725->95722 95727 646986 __calloc_crt 47 API calls 95725->95727 95728 652d4d 95725->95728 95729 652d72 95725->95729 95732 652d89 95725->95732 95782 652567 47 API calls 2 library calls 95725->95782 95726 641c9d _free 47 API calls 95726->95722 95727->95725 95728->95726 95730 641c9d _free 47 API calls 95729->95730 95730->95722 95783 646e20 IsProcessorFeaturePresent 95732->95783 95734 652d95 95734->95655 95736 6411a1 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 95735->95736 95738 6411e0 __IsNonwritableInCurrentImage 95736->95738 95798 640f0a 52 API calls __cinit 95736->95798 95738->95659 95740 691ebf 95739->95740 95741 623a29 95739->95741 95742 623a63 IsThemeActive 95741->95742 95799 641405 95742->95799 95746 623a8f 95811 623adb SystemParametersInfoW SystemParametersInfoW 95746->95811 95748 623a9b 95812 623d19 95748->95812 95752->95637 95753->95641 95754->95648 95760->95673 95761->95675 95762->95679 95763->95680 95766 64698d 95764->95766 95767 6469ca 95766->95767 95768 6469ab Sleep 95766->95768 95773 6530aa 95766->95773 95767->95684 95770 647ec9 TlsSetValue 95767->95770 95769 6469c2 95768->95769 95769->95766 95769->95767 95770->95687 95771->95691 95772->95688 95774 6530b5 95773->95774 95779 6530d0 __calloc_impl 95773->95779 95775 6530c1 95774->95775 95774->95779 95780 647c0e 47 API calls __getptd_noexit 95775->95780 95777 6530e0 HeapAlloc 95778 6530c6 95777->95778 95777->95779 95778->95766 95779->95777 95779->95778 95780->95778 95781->95699 95782->95725 95784 646e2b 95783->95784 95789 646cb5 95784->95789 95788 646e46 95788->95734 95790 646ccf _memset __call_reportfault 95789->95790 95791 646cef IsDebuggerPresent 95790->95791 95797 6481ac SetUnhandledExceptionFilter UnhandledExceptionFilter 95791->95797 95793 64a70c _W_store_winword 6 API calls 95795 646dd6 95793->95795 95794 646db3 __call_reportfault 95794->95793 95796 648197 GetCurrentProcess TerminateProcess 95795->95796 95796->95788 95797->95794 95798->95738 95800 647cf4 __lock 47 API calls 95799->95800 95801 641410 95800->95801 95864 647e58 LeaveCriticalSection 95801->95864 95803 623a88 95804 64146d 95803->95804 95805 641477 95804->95805 95806 641491 95804->95806 95805->95806 95865 647c0e 47 API calls __getptd_noexit 95805->95865 95806->95746 95808 641481 95866 646e10 8 API calls __wcsnicmp 95808->95866 95810 64148c 95810->95746 95811->95748 95813 623d26 __ftell_nolock 95812->95813 95814 62d7f7 48 API calls 95813->95814 95815 623d31 GetCurrentDirectoryW 95814->95815 95867 6261ca 95815->95867 95817 623d57 IsDebuggerPresent 95818 623d65 95817->95818 95819 691cc1 MessageBoxA 95817->95819 95864->95803 95865->95808 95866->95810 95984 63e99b 95867->95984 95871 6261eb 95872 625374 50 API calls 95871->95872 95873 6261ff 95872->95873 95874 62ce19 48 API calls 95873->95874 95875 62620c 95874->95875 96001 6239db 95875->96001 95877 626216 Mailbox 95878 626eed 48 API calls 95877->95878 95879 62622b 95878->95879 96013 629048 95879->96013 95882 62ce19 48 API calls 95883 626244 95882->95883 95884 62d6e9 55 API calls 95883->95884 95885 626254 Mailbox 95884->95885 95886 62ce19 48 API calls 95885->95886 95887 62627c 95886->95887 95888 62d6e9 55 API calls 95887->95888 95889 62628f Mailbox 95888->95889 95890 62ce19 48 API calls 95889->95890 95891 6262a0 95890->95891 95892 62d645 53 API calls 95891->95892 95893 6262b2 Mailbox 95892->95893 95894 62d7f7 48 API calls 95893->95894 95895 6262c5 95894->95895 96016 6263fc 95895->96016 95899 6262df 95900 691c08 95899->95900 95901 6262e9 95899->95901 95903 6263fc 48 API calls 95900->95903 95902 640fa7 _W_store_winword 59 API calls 95901->95902 95904 6262f4 95902->95904 95905 691c1c 95903->95905 95904->95905 95906 6262fe 95904->95906 95907 6263fc 48 API calls 95905->95907 95908 640fa7 _W_store_winword 59 API calls 95906->95908 95909 691c38 95907->95909 95910 626309 95908->95910 95912 625374 50 API calls 95909->95912 95910->95909 95911 626313 95910->95911 95913 640fa7 _W_store_winword 59 API calls 95911->95913 95914 691c5d 95912->95914 95915 62631e 95913->95915 95916 6263fc 48 API calls 95914->95916 95917 62635f 95915->95917 95918 691c86 95915->95918 95921 6263fc 48 API calls 95915->95921 95920 691c69 95916->95920 95917->95918 95919 62636c 95917->95919 95922 626eed 48 API calls 95918->95922 95926 63c050 48 API calls 95919->95926 95923 626eed 48 API calls 95920->95923 95924 626342 95921->95924 95925 691ca8 95922->95925 95927 691c77 95923->95927 95928 626eed 48 API calls 95924->95928 95929 6263fc 48 API calls 95925->95929 95930 626384 95926->95930 95931 6263fc 48 API calls 95927->95931 95932 626350 95928->95932 95933 691cb5 95929->95933 95934 631b90 48 API calls 95930->95934 95931->95918 95935 6263fc 48 API calls 95932->95935 95933->95933 95938 626394 95934->95938 95935->95917 95936 631b90 48 API calls 95936->95938 95938->95936 95939 6263fc 48 API calls 95938->95939 95940 6263d6 Mailbox 95938->95940 96032 626b68 48 API calls 95938->96032 95939->95938 95940->95817 95985 62d7f7 48 API calls 95984->95985 95986 6261db 95985->95986 95987 626009 95986->95987 95988 626016 __ftell_nolock 95987->95988 95989 626a63 48 API calls 95988->95989 95994 62617c Mailbox 95988->95994 95990 626048 95989->95990 95999 62607e Mailbox 95990->95999 96033 6261a6 95990->96033 95992 62614f 95993 62ce19 48 API calls 95992->95993 95992->95994 95996 626170 95993->95996 95994->95871 95995 62ce19 48 API calls 95995->95999 95997 6264cf 48 API calls 95996->95997 95997->95994 95998 6264cf 48 API calls 95998->95999 95999->95992 95999->95994 95999->95995 95999->95998 96000 6261a6 48 API calls 95999->96000 96000->95999 96002 6241a9 136 API calls 96001->96002 96004 6239fe 96002->96004 96003 623a06 96003->95877 96004->96003 96036 66c396 96004->96036 96007 692ff0 96009 641c9d _free 47 API calls 96007->96009 96008 624252 84 API calls 96008->96007 96010 692ffd 96009->96010 96011 624252 84 API calls 96010->96011 96012 693006 96011->96012 96012->96012 96014 63f4ea 48 API calls 96013->96014 96015 626237 96014->96015 96015->95882 96017 626406 96016->96017 96018 62641f 96016->96018 96019 626eed 48 API calls 96017->96019 96020 626a63 48 API calls 96018->96020 96021 6262d1 96019->96021 96020->96021 96022 640fa7 96021->96022 96023 640fb3 96022->96023 96024 641028 96022->96024 96031 640fd8 96023->96031 96071 647c0e 47 API calls __getptd_noexit 96023->96071 96073 64103a 59 API calls 4 library calls 96024->96073 96027 641035 96027->95899 96028 640fbf 96072 646e10 8 API calls __wcsnicmp 96028->96072 96030 640fca 96030->95899 96031->95899 96032->95938 96034 62bdfa 48 API calls 96033->96034 96035 6261b1 96034->96035 96035->95990 96037 624517 83 API calls 96036->96037 96038 66c405 96037->96038 96039 66c56d 94 API calls 96038->96039 96040 66c417 96039->96040 96041 6244ed 64 API calls 96040->96041 96068 66c41b 96040->96068 96042 66c432 96041->96042 96043 6244ed 64 API calls 96042->96043 96044 66c442 96043->96044 96045 6244ed 64 API calls 96044->96045 96046 66c45d 96045->96046 96047 6244ed 64 API calls 96046->96047 96048 66c478 96047->96048 96049 624517 83 API calls 96048->96049 96050 66c48f 96049->96050 96051 64395c _W_store_winword 47 API calls 96050->96051 96052 66c496 96051->96052 96053 64395c _W_store_winword 47 API calls 96052->96053 96054 66c4a0 96053->96054 96055 6244ed 64 API calls 96054->96055 96056 66c4b4 96055->96056 96057 66bf5a GetSystemTimeAsFileTime 96056->96057 96058 66c4c7 96057->96058 96059 66c4f1 96058->96059 96060 66c4dc 96058->96060 96061 66c556 96059->96061 96062 66c4f7 96059->96062 96063 641c9d _free 47 API calls 96060->96063 96065 641c9d _free 47 API calls 96061->96065 96064 66b965 118 API calls 96062->96064 96066 66c4e2 96063->96066 96067 66c54e 96064->96067 96065->96068 96069 641c9d _free 47 API calls 96066->96069 96070 641c9d _free 47 API calls 96067->96070 96068->96007 96068->96008 96069->96068 96070->96068 96071->96028 96072->96030 96073->96027 96284 cab300 96285 ca8f50 GetPEB 96284->96285 96286 cab3a3 96285->96286 96298 cab1f0 96286->96298 96299 cab1f9 Sleep 96298->96299 96300 cab207 96299->96300 96301 699c06 96312 63d3be 96301->96312 96303 699c1c 96311 699c91 Mailbox 96303->96311 96321 621caa 49 API calls 96303->96321 96305 633200 335 API calls 96306 699cc5 96305->96306 96309 69a7ab Mailbox 96306->96309 96323 66cc5c 86 API calls 4 library calls 96306->96323 96308 699c71 96308->96306 96322 66b171 48 API calls 96308->96322 96311->96305 96313 63d3ca 96312->96313 96314 63d3dc 96312->96314 96324 62dcae 50 API calls Mailbox 96313->96324 96316 63d3e2 96314->96316 96317 63d40b 96314->96317 96319 63f4ea 48 API calls 96316->96319 96325 62dcae 50 API calls Mailbox 96317->96325 96320 63d3d4 96319->96320 96320->96303 96321->96308 96322->96311 96323->96309 96324->96320 96325->96320

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 856 64b043-64b080 call 64f8a0 859 64b082-64b084 856->859 860 64b089-64b08b 856->860 861 64b860-64b86c call 64a70c 859->861 862 64b0ac-64b0d9 860->862 863 64b08d-64b0a7 call 647bda call 647c0e call 646e10 860->863 864 64b0e0-64b0e7 862->864 865 64b0db-64b0de 862->865 863->861 869 64b105 864->869 870 64b0e9-64b100 call 647bda call 647c0e call 646e10 864->870 865->864 868 64b10b-64b110 865->868 874 64b112-64b11c call 64f82f 868->874 875 64b11f-64b12d call 653bf2 868->875 869->868 904 64b851-64b854 870->904 874->875 885 64b133-64b145 875->885 886 64b44b-64b45d 875->886 885->886 889 64b14b-64b183 call 647a0d GetConsoleMode 885->889 890 64b463-64b473 886->890 891 64b7b8-64b7d5 WriteFile 886->891 889->886 909 64b189-64b18f 889->909 894 64b479-64b484 890->894 895 64b55a-64b55f 890->895 897 64b7d7-64b7df 891->897 898 64b7e1-64b7e7 GetLastError 891->898 902 64b48a-64b49a 894->902 903 64b81b-64b833 894->903 899 64b565-64b56e 895->899 900 64b663-64b66e 895->900 905 64b7e9 897->905 898->905 899->903 907 64b574 899->907 900->903 913 64b674 900->913 910 64b4a0-64b4a3 902->910 911 64b835-64b838 903->911 912 64b83e-64b84e call 647c0e call 647bda 903->912 908 64b85e-64b85f 904->908 906 64b7ef-64b7f1 905->906 914 64b856-64b85c 906->914 915 64b7f3-64b7f5 906->915 916 64b57e-64b595 907->916 908->861 917 64b191-64b193 909->917 918 64b199-64b1bc GetConsoleCP 909->918 919 64b4a5-64b4be 910->919 920 64b4e9-64b520 WriteFile 910->920 911->912 921 64b83a-64b83c 911->921 912->904 922 64b67e-64b693 913->922 914->908 915->903 925 64b7f7-64b7fc 915->925 926 64b59b-64b59e 916->926 917->886 917->918 927 64b440-64b446 918->927 928 64b1c2-64b1ca 918->928 929 64b4c0-64b4ca 919->929 930 64b4cb-64b4e7 919->930 920->898 931 64b526-64b538 920->931 921->908 932 64b699-64b69b 922->932 936 64b812-64b819 call 647bed 925->936 937 64b7fe-64b810 call 647c0e call 647bda 925->937 938 64b5a0-64b5b6 926->938 939 64b5de-64b627 WriteFile 926->939 927->915 940 64b1d4-64b1d6 928->940 929->930 930->910 930->920 931->906 941 64b53e-64b54f 931->941 933 64b69d-64b6b3 932->933 934 64b6d8-64b719 WideCharToMultiByte 932->934 942 64b6b5-64b6c4 933->942 943 64b6c7-64b6d6 933->943 934->898 945 64b71f-64b721 934->945 936->904 937->904 947 64b5cd-64b5dc 938->947 948 64b5b8-64b5ca 938->948 939->898 950 64b62d-64b645 939->950 951 64b1dc-64b1fe 940->951 952 64b36b-64b36e 940->952 941->902 953 64b555 941->953 942->943 943->932 943->934 956 64b727-64b75a WriteFile 945->956 947->926 947->939 948->947 950->906 959 64b64b-64b658 950->959 960 64b217-64b223 call 641688 951->960 961 64b200-64b215 951->961 954 64b375-64b3a2 952->954 955 64b370-64b373 952->955 953->906 962 64b3a8-64b3ab 954->962 955->954 955->962 963 64b75c-64b776 956->963 964 64b77a-64b78e GetLastError 956->964 959->916 966 64b65e 959->966 976 64b225-64b239 960->976 977 64b269-64b26b 960->977 967 64b271-64b283 call 6540f7 961->967 969 64b3b2-64b3c5 call 655884 962->969 970 64b3ad-64b3b0 962->970 963->956 971 64b778 963->971 974 64b794-64b796 964->974 966->906 986 64b435-64b43b 967->986 987 64b289 967->987 969->898 990 64b3cb-64b3d5 969->990 970->969 978 64b407-64b40a 970->978 971->974 974->905 981 64b798-64b7b0 974->981 983 64b412-64b42d 976->983 984 64b23f-64b254 call 6540f7 976->984 977->967 978->940 982 64b410 978->982 981->922 988 64b7b6 981->988 982->986 983->986 984->986 996 64b25a-64b267 984->996 986->905 991 64b28f-64b2c4 WideCharToMultiByte 987->991 988->906 993 64b3d7-64b3ee call 655884 990->993 994 64b3fb-64b401 990->994 991->986 995 64b2ca-64b2f0 WriteFile 991->995 993->898 1001 64b3f4-64b3f5 993->1001 994->978 995->898 998 64b2f6-64b30e 995->998 996->991 998->986 1000 64b314-64b31b 998->1000 1000->994 1002 64b321-64b34c WriteFile 1000->1002 1001->994 1002->898 1003 64b352-64b359 1002->1003 1003->986 1004 64b35f-64b366 1003->1004 1004->994
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3adf484a9d1f5b9acd617d81420c50a957b85a120dda66e82400fdd02b043130
                                                      • Instruction ID: 6948ba21be1c977ef5c5df1fa40bb83a3ee8c8c47858bf10fa168deece35b549
                                                      • Opcode Fuzzy Hash: 3adf484a9d1f5b9acd617d81420c50a957b85a120dda66e82400fdd02b043130
                                                      • Instruction Fuzzy Hash: BC325A75B022288FDB249F54DC81AE9B7F6FF4A310F1850D9E40AA7A85D7309E81CF52

                                                      Control-flow Graph

                                                      APIs
                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00623AA3,?), ref: 00623D45
                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,00623AA3,?), ref: 00623D57
                                                      • GetFullPathNameW.KERNEL32(00007FFF,?,?,006E1148,006E1130,?,?,?,?,00623AA3,?), ref: 00623DC8
                                                        • Part of subcall function 00626430: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00623DEE,006E1148,?,?,?,?,?,00623AA3,?), ref: 00626471
                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,00623AA3,?), ref: 00623E48
                                                      • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,006D28F4,00000010), ref: 00691CCE
                                                      • SetCurrentDirectoryW.KERNEL32(?,006E1148,?,?,?,?,?,00623AA3,?), ref: 00691D06
                                                      • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,006BDAB4,006E1148,?,?,?,?,?,00623AA3,?), ref: 00691D89
                                                      • ShellExecuteW.SHELL32(00000000,?,?,?,?,00623AA3), ref: 00691D90
                                                        • Part of subcall function 00623E6E: GetSysColorBrush.USER32(0000000F), ref: 00623E79
                                                        • Part of subcall function 00623E6E: LoadCursorW.USER32(00000000,00007F00), ref: 00623E88
                                                        • Part of subcall function 00623E6E: LoadIconW.USER32(00000063), ref: 00623E9E
                                                        • Part of subcall function 00623E6E: LoadIconW.USER32(000000A4), ref: 00623EB0
                                                        • Part of subcall function 00623E6E: LoadIconW.USER32(000000A2), ref: 00623EC2
                                                        • Part of subcall function 00623E6E: RegisterClassExW.USER32(?), ref: 00623F30
                                                        • Part of subcall function 006236B8: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 006236E6
                                                        • Part of subcall function 006236B8: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00623707
                                                        • Part of subcall function 006236B8: ShowWindow.USER32(00000000,?,?,?,?,00623AA3,?), ref: 0062371B
                                                        • Part of subcall function 006236B8: ShowWindow.USER32(00000000,?,?,?,?,00623AA3,?), ref: 00623724
                                                        • Part of subcall function 00624FFC: _memset.LIBCMT ref: 00625022
                                                        • Part of subcall function 00624FFC: Shell_NotifyIconW.SHELL32(00000000,?), ref: 006250CB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Window$IconLoad$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundMessageNotifyPresentRegisterShellShell__memset
                                                      • String ID: ()m$This is a third-party compiled AutoIt script.$runas
                                                      • API String ID: 438480954-333318816
                                                      • Opcode ID: b855cf2d083756a5f652dd3158bab1e458b68261f2bdaf9dc61b0d53e865bb59
                                                      • Instruction ID: dee8b57db497728c1e63cb632b8158baf81471b06f620992f2371ae272c82a25
                                                      • Opcode Fuzzy Hash: b855cf2d083756a5f652dd3158bab1e458b68261f2bdaf9dc61b0d53e865bb59
                                                      • Instruction Fuzzy Hash: C75106309047A9AACF11BBB0EC55DED7B7B9F17700F00406AF6426E292DB74564A9F21

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1288 63ddc0-63de4f call 62d7f7 GetVersionExW call 626a63 call 63dfb4 call 626571 1297 6924c8-6924cb 1288->1297 1298 63de55-63de56 1288->1298 1299 6924cd 1297->1299 1300 6924e4-6924e8 1297->1300 1301 63de92-63dea2 call 63df77 1298->1301 1302 63de58-63de63 1298->1302 1304 6924d0 1299->1304 1305 6924ea-6924f3 1300->1305 1306 6924d3-6924dc 1300->1306 1315 63dec7-63dee1 1301->1315 1316 63dea4-63dec1 GetCurrentProcess call 63df5f 1301->1316 1307 69244e-692454 1302->1307 1308 63de69-63de6b 1302->1308 1304->1306 1305->1304 1312 6924f5-6924f8 1305->1312 1306->1300 1310 69245e-692464 1307->1310 1311 692456-692459 1307->1311 1313 692469-692475 1308->1313 1314 63de71-63de74 1308->1314 1310->1301 1311->1301 1312->1306 1317 69247f-692485 1313->1317 1318 692477-69247a 1313->1318 1319 63de7a-63de89 1314->1319 1320 692495-692498 1314->1320 1325 63dee3-63def7 call 63e00c 1315->1325 1326 63df31-63df3b GetSystemInfo 1315->1326 1316->1315 1339 63dec3 1316->1339 1317->1301 1318->1301 1321 69248a-692490 1319->1321 1322 63de8f 1319->1322 1320->1301 1323 69249e-6924b3 1320->1323 1321->1301 1322->1301 1327 6924bd-6924c3 1323->1327 1328 6924b5-6924b8 1323->1328 1336 63df29-63df2f GetSystemInfo 1325->1336 1337 63def9-63df01 call 63dff4 GetNativeSystemInfo 1325->1337 1330 63df0e-63df1a 1326->1330 1327->1301 1328->1301 1332 63df21-63df26 1330->1332 1333 63df1c-63df1f FreeLibrary 1330->1333 1333->1332 1338 63df03-63df07 1336->1338 1337->1338 1338->1330 1342 63df09-63df0c FreeLibrary 1338->1342 1339->1315 1342->1330
                                                      APIs
                                                      • GetVersionExW.KERNEL32(?), ref: 0063DDEC
                                                      • GetCurrentProcess.KERNEL32(00000000,006BDC38,?,?), ref: 0063DEAC
                                                      • GetNativeSystemInfo.KERNELBASE(?,006BDC38,?,?), ref: 0063DF01
                                                      • FreeLibrary.KERNEL32(00000000,?,?), ref: 0063DF0C
                                                      • FreeLibrary.KERNEL32(00000000,?,?), ref: 0063DF1F
                                                      • GetSystemInfo.KERNEL32(?,006BDC38,?,?), ref: 0063DF29
                                                      • GetSystemInfo.KERNEL32(?,006BDC38,?,?), ref: 0063DF35
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: InfoSystem$FreeLibrary$CurrentNativeProcessVersion
                                                      • String ID:
                                                      • API String ID: 3851250370-0
                                                      • Opcode ID: b6c10673a70d468c55fae74ed379478889670d0f4d2e31a3d2aaadf59bf77732
                                                      • Instruction ID: 458826be5da2c74bc9f4852f5c30db45011e0f0dcb06c9da34d7b5f8d5f23872
                                                      • Opcode Fuzzy Hash: b6c10673a70d468c55fae74ed379478889670d0f4d2e31a3d2aaadf59bf77732
                                                      • Instruction Fuzzy Hash: F76191B180A284DBCF15DF68A8C11E97FB66F29300F1985D9D8459F347C634CA09CBA5

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1360 62406b-624083 CreateStreamOnHGlobal 1361 6240a3-6240a6 1360->1361 1362 624085-62409c FindResourceExW 1360->1362 1363 6240a2 1362->1363 1364 694f16-694f25 LoadResource 1362->1364 1363->1361 1364->1363 1365 694f2b-694f39 SizeofResource 1364->1365 1365->1363 1366 694f3f-694f4a LockResource 1365->1366 1366->1363 1367 694f50-694f6e 1366->1367 1367->1363
                                                      APIs
                                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,0062449E,?,?,00000000,00000001), ref: 0062407B
                                                      • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,0062449E,?,?,00000000,00000001), ref: 00624092
                                                      • LoadResource.KERNEL32(?,00000000,?,?,0062449E,?,?,00000000,00000001,?,?,?,?,?,?,006241FB), ref: 00694F1A
                                                      • SizeofResource.KERNEL32(?,00000000,?,?,0062449E,?,?,00000000,00000001,?,?,?,?,?,?,006241FB), ref: 00694F2F
                                                      • LockResource.KERNEL32(0062449E,?,?,0062449E,?,?,00000000,00000001,?,?,?,?,?,?,006241FB,00000000), ref: 00694F42
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                      • String ID: SCRIPT
                                                      • API String ID: 3051347437-3967369404
                                                      • Opcode ID: c0579e1b4a080ab5e601c2b6ff87d9a6e72777d736760f7ed5ca546cfb4020e5
                                                      • Instruction ID: 9c5f596560515a5ea9a391b98e54479569db1af14582660fee2edca76868ca29
                                                      • Opcode Fuzzy Hash: c0579e1b4a080ab5e601c2b6ff87d9a6e72777d736760f7ed5ca546cfb4020e5
                                                      • Instruction Fuzzy Hash: E5112E71200711AFE7219B65EC48F677BBAEFC9B55F20416CF6029A650DB71ED40CA21
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Exception@8Throwstd::exception::exception
                                                      • String ID: @$ n$ n$ n
                                                      • API String ID: 3728558374-1613168149
                                                      • Opcode ID: 4b588245792bd92d0e037b87dd7edc0119605448f0a5bacd72596d9b95f31293
                                                      • Instruction ID: 9a6a207a2fd46539918bfc1029d9638f2161fb92d4c2620944c06cdc57bfcc3b
                                                      • Opcode Fuzzy Hash: 4b588245792bd92d0e037b87dd7edc0119605448f0a5bacd72596d9b95f31293
                                                      • Instruction Fuzzy Hash: 0B728B70E042199BCF14DF94C481AEEB7BBEF48310F14805AE909AB391DB75AE46CBD5
                                                      APIs
                                                      • GetFileAttributesW.KERNELBASE(?,00692F49), ref: 00666CB9
                                                      • FindFirstFileW.KERNELBASE(?,?), ref: 00666CCA
                                                      • FindClose.KERNEL32(00000000), ref: 00666CDA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: FileFind$AttributesCloseFirst
                                                      • String ID:
                                                      • API String ID: 48322524-0
                                                      • Opcode ID: b654b90e9895c56c3d1125b26a52741c83d708bc890ad59f9caad825b121343a
                                                      • Instruction ID: 5a0fdc50e46d3f1aa9c5c4e3100a1ce48acc0578107f431ae00349b5d63c47ed
                                                      • Opcode Fuzzy Hash: b654b90e9895c56c3d1125b26a52741c83d708bc890ad59f9caad825b121343a
                                                      • Instruction Fuzzy Hash: 28E012318149155783106738EC094E9766EDE06339B104716F576C16D0EB70AD448995
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: BuffCharUpper
                                                      • String ID: n
                                                      • API String ID: 3964851224-3686792289
                                                      • Opcode ID: 8b3033157591b2e07675b9a9147f7b47245bd156a86c47ef39c78b2957d5f366
                                                      • Instruction ID: e600b0bc1f4d14a9d480d63bf7a70cee6c3d812b0c32a4adfda0d58714dd627b
                                                      • Opcode Fuzzy Hash: 8b3033157591b2e07675b9a9147f7b47245bd156a86c47ef39c78b2957d5f366
                                                      • Instruction Fuzzy Hash: 84927B706083519FDB64DF18C480B6AB7E6BF88304F14885DF89A8B362D775ED46CB92
                                                      APIs
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0062E959
                                                      • timeGetTime.WINMM ref: 0062EBFA
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0062ED2E
                                                      • TranslateMessage.USER32(?), ref: 0062ED3F
                                                      • DispatchMessageW.USER32(?), ref: 0062ED4A
                                                      • LockWindowUpdate.USER32(00000000), ref: 0062ED79
                                                      • DestroyWindow.USER32 ref: 0062ED85
                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0062ED9F
                                                      • Sleep.KERNEL32(0000000A), ref: 00695270
                                                      • TranslateMessage.USER32(?), ref: 006959F7
                                                      • DispatchMessageW.USER32(?), ref: 00695A05
                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00695A19
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Message$DispatchPeekTranslateWindow$DestroyLockSleepTimeUpdatetime
                                                      • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                      • API String ID: 2641332412-570651680
                                                      • Opcode ID: 566bbbfbf3e8697e9af71152dc08cbed58bce024b2f2d2b590821d127a907d75
                                                      • Instruction ID: f7ceb83e5d186cb9585b1e49dc1ef506f6b345d200917bcb7e24aec92506ec4d
                                                      • Opcode Fuzzy Hash: 566bbbfbf3e8697e9af71152dc08cbed58bce024b2f2d2b590821d127a907d75
                                                      • Instruction Fuzzy Hash: 7E62D070508B90DFDB61DF24D885BAA77EBBF45304F08097DE9868B292DB71A844CF52
                                                      APIs
                                                      • ___createFile.LIBCMT ref: 00655EC3
                                                      • ___createFile.LIBCMT ref: 00655F04
                                                      • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00655F2D
                                                      • __dosmaperr.LIBCMT ref: 00655F34
                                                      • GetFileType.KERNELBASE(00000000,?,?,?,?,?,00000000,00000109), ref: 00655F47
                                                      • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00655F6A
                                                      • __dosmaperr.LIBCMT ref: 00655F73
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00655F7C
                                                      • __set_osfhnd.LIBCMT ref: 00655FAC
                                                      • __lseeki64_nolock.LIBCMT ref: 00656016
                                                      • __close_nolock.LIBCMT ref: 0065603C
                                                      • __chsize_nolock.LIBCMT ref: 0065606C
                                                      • __lseeki64_nolock.LIBCMT ref: 0065607E
                                                      • __lseeki64_nolock.LIBCMT ref: 00656176
                                                      • __lseeki64_nolock.LIBCMT ref: 0065618B
                                                      • __close_nolock.LIBCMT ref: 006561EB
                                                        • Part of subcall function 0064EA9C: CloseHandle.KERNELBASE(00000000,006CEEF4,00000000,?,00656041,006CEEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 0064EAEC
                                                        • Part of subcall function 0064EA9C: GetLastError.KERNEL32(?,00656041,006CEEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 0064EAF6
                                                        • Part of subcall function 0064EA9C: __free_osfhnd.LIBCMT ref: 0064EB03
                                                        • Part of subcall function 0064EA9C: __dosmaperr.LIBCMT ref: 0064EB25
                                                        • Part of subcall function 00647C0E: __getptd_noexit.LIBCMT ref: 00647C0E
                                                      • __lseeki64_nolock.LIBCMT ref: 0065620D
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00656342
                                                      • ___createFile.LIBCMT ref: 00656361
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000109), ref: 0065636E
                                                      • __dosmaperr.LIBCMT ref: 00656375
                                                      • __free_osfhnd.LIBCMT ref: 00656395
                                                      • __invoke_watson.LIBCMT ref: 006563C3
                                                      • __wsopen_helper.LIBCMT ref: 006563DD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: __lseeki64_nolock$ErrorFileLast__dosmaperr$CloseHandle___create$__close_nolock__free_osfhnd$Type__chsize_nolock__getptd_noexit__invoke_watson__set_osfhnd__wsopen_helper
                                                      • String ID: @
                                                      • API String ID: 3896587723-2766056989
                                                      • Opcode ID: cf5a85734c11294fc0c98a8e94c1482a2fd9e8a86e5c68355ce3a3204a33f6b0
                                                      • Instruction ID: e4c7b207e955d4d88ae49ec2e90ed5d9567078969c86b086cedb2b6c537bbd72
                                                      • Opcode Fuzzy Hash: cf5a85734c11294fc0c98a8e94c1482a2fd9e8a86e5c68355ce3a3204a33f6b0
                                                      • Instruction Fuzzy Hash: 472202719006059BEB259F68CC99BED7B73EF01326F644228FC229B3E2C6358D49CB55

                                                      Control-flow Graph

                                                      APIs
                                                      • _wcscpy.LIBCMT ref: 0066FA96
                                                      • _wcschr.LIBCMT ref: 0066FAA4
                                                      • _wcscpy.LIBCMT ref: 0066FABB
                                                      • _wcscat.LIBCMT ref: 0066FACA
                                                      • _wcscat.LIBCMT ref: 0066FAE8
                                                      • _wcscpy.LIBCMT ref: 0066FB09
                                                      • __wsplitpath.LIBCMT ref: 0066FBE6
                                                      • _wcscpy.LIBCMT ref: 0066FC0B
                                                      • _wcscpy.LIBCMT ref: 0066FC1D
                                                      • _wcscpy.LIBCMT ref: 0066FC32
                                                      • _wcscat.LIBCMT ref: 0066FC47
                                                      • _wcscat.LIBCMT ref: 0066FC59
                                                      • _wcscat.LIBCMT ref: 0066FC6E
                                                        • Part of subcall function 0066BFA4: _wcscmp.LIBCMT ref: 0066C03E
                                                        • Part of subcall function 0066BFA4: __wsplitpath.LIBCMT ref: 0066C083
                                                        • Part of subcall function 0066BFA4: _wcscpy.LIBCMT ref: 0066C096
                                                        • Part of subcall function 0066BFA4: _wcscat.LIBCMT ref: 0066C0A9
                                                        • Part of subcall function 0066BFA4: __wsplitpath.LIBCMT ref: 0066C0CE
                                                        • Part of subcall function 0066BFA4: _wcscat.LIBCMT ref: 0066C0E4
                                                        • Part of subcall function 0066BFA4: _wcscat.LIBCMT ref: 0066C0F7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: _wcscat$_wcscpy$__wsplitpath$_wcschr_wcscmp
                                                      • String ID: >>>AUTOIT SCRIPT<<<$t2m
                                                      • API String ID: 2955681530-3211479820
                                                      • Opcode ID: 9045e3bd6ad853dd40094d6f0b4c861b9e57ea15f9900ab2848ddbc9f2d38d5a
                                                      • Instruction ID: f2ef55b33da612ffe8428fe62591c010afb04802f5d3a5f2bdd9328807a3f5ba
                                                      • Opcode Fuzzy Hash: 9045e3bd6ad853dd40094d6f0b4c861b9e57ea15f9900ab2848ddbc9f2d38d5a
                                                      • Instruction Fuzzy Hash: B191A172504715AFDB60EF54D891E9BB3EABF84300F04482DF94997391DB30EA48CB9A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: __getptd_noexit
                                                      • String ID:
                                                      • API String ID: 3074181302-0
                                                      • Opcode ID: d65a9553fb7e417a41d16491a29c3129cf24c5ce16133b111b92eaa0980d3564
                                                      • Instruction ID: e9a9407362cde69125478b6b0551740e3a4780ca29ad15895afb5def0dbd7fbe
                                                      • Opcode Fuzzy Hash: d65a9553fb7e417a41d16491a29c3129cf24c5ce16133b111b92eaa0980d3564
                                                      • Instruction Fuzzy Hash: B3321770E04285DFDB218FA8D880BED7BB3AF56314F24416AE8559F392C7709D42CBA1

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00623F86
                                                      • RegisterClassExW.USER32(00000030), ref: 00623FB0
                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00623FC1
                                                      • InitCommonControlsEx.COMCTL32(?), ref: 00623FDE
                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00623FEE
                                                      • LoadIconW.USER32(000000A9), ref: 00624004
                                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00624013
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                      • API String ID: 2914291525-1005189915
                                                      • Opcode ID: 82d85bd755b40f2a09b71930b4316aa2056ad0557fb6f88e40a49c5eff350772
                                                      • Instruction ID: 2c2f1861fe858d7cd94d6538fb07b80ddb4e20573442172caa562c7d8b8591af
                                                      • Opcode Fuzzy Hash: 82d85bd755b40f2a09b71930b4316aa2056ad0557fb6f88e40a49c5eff350772
                                                      • Instruction Fuzzy Hash: 2621D8B5D00359AFDB00EFA4EC89BCDBBB6FB0A700F10611AF611AA2A0D7B55544DF91

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1073 66bfa4-66c054 call 64f8a0 call 63f4ea call 6247b7 call 66bdb4 call 624517 call 6415e3 1086 66c107-66c10e call 66c56d 1073->1086 1087 66c05a-66c061 call 66c56d 1073->1087 1092 66c117 1086->1092 1093 66c110-66c112 1086->1093 1087->1093 1094 66c067-66c105 call 641dfc call 640d23 call 640cf4 call 641dfc call 640cf4 * 2 1087->1094 1097 66c11a-66c1d6 call 6244ed * 8 call 66c71a call 643499 1092->1097 1095 66c367-66c368 1093->1095 1094->1097 1100 66c385-66c393 call 6247e2 1095->1100 1132 66c1df-66c1fa call 66bdf8 1097->1132 1133 66c1d8-66c1da 1097->1133 1136 66c200-66c208 1132->1136 1137 66c28c-66c298 call 6435e4 1132->1137 1133->1095 1138 66c210 1136->1138 1139 66c20a-66c20e 1136->1139 1144 66c2ae-66c2b2 1137->1144 1145 66c29a-66c2a9 DeleteFileW 1137->1145 1141 66c215-66c233 call 6244ed 1138->1141 1139->1141 1149 66c235-66c23b 1141->1149 1150 66c25d-66c273 call 66b791 call 642aae 1141->1150 1147 66c342-66c356 CopyFileW 1144->1147 1148 66c2b8-66c32f call 66c81d call 66c845 call 66b965 1144->1148 1145->1095 1152 66c36a-66c380 DeleteFileW call 66c6d9 1147->1152 1153 66c358-66c365 DeleteFileW 1147->1153 1148->1152 1169 66c331-66c340 DeleteFileW 1148->1169 1154 66c23d-66c250 call 66bf2e 1149->1154 1166 66c278-66c283 1150->1166 1152->1100 1153->1095 1164 66c252-66c25b 1154->1164 1164->1150 1166->1136 1168 66c289 1166->1168 1168->1137 1169->1095
                                                      APIs
                                                        • Part of subcall function 0066BDB4: __time64.LIBCMT ref: 0066BDBE
                                                        • Part of subcall function 00624517: _fseek.LIBCMT ref: 0062452F
                                                      • __wsplitpath.LIBCMT ref: 0066C083
                                                        • Part of subcall function 00641DFC: __wsplitpath_helper.LIBCMT ref: 00641E3C
                                                      • _wcscpy.LIBCMT ref: 0066C096
                                                      • _wcscat.LIBCMT ref: 0066C0A9
                                                      • __wsplitpath.LIBCMT ref: 0066C0CE
                                                      • _wcscat.LIBCMT ref: 0066C0E4
                                                      • _wcscat.LIBCMT ref: 0066C0F7
                                                      • _wcscmp.LIBCMT ref: 0066C03E
                                                        • Part of subcall function 0066C56D: _wcscmp.LIBCMT ref: 0066C65D
                                                        • Part of subcall function 0066C56D: _wcscmp.LIBCMT ref: 0066C670
                                                      • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 0066C2A1
                                                      • DeleteFileW.KERNEL32(?,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0066C338
                                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0066C34E
                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 0066C35F
                                                      • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 0066C371
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath$Copy__time64__wsplitpath_helper_fseek_wcscpy
                                                      • String ID:
                                                      • API String ID: 2378138488-0
                                                      • Opcode ID: 6416944bcf151c0552f407b67668a1e9fe6de30d73a6c3b6e8e56ac4bc103185
                                                      • Instruction ID: bb13b131c3c0d305c62aeab84568321c84c21888fda1bfb8c02a226685779e4b
                                                      • Opcode Fuzzy Hash: 6416944bcf151c0552f407b67668a1e9fe6de30d73a6c3b6e8e56ac4bc103185
                                                      • Instruction Fuzzy Hash: E7C12EB1E00129ABDF51DF95CC81EEEB7BEEF45310F1040AAF649E6251DB309A448F65

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1170 623742-623762 1172 6237c2-6237c4 1170->1172 1173 623764-623767 1170->1173 1172->1173 1176 6237c6 1172->1176 1174 6237c8 1173->1174 1175 623769-623770 1173->1175 1178 691e00-691e2e call 622ff6 call 63e312 1174->1178 1179 6237ce-6237d1 1174->1179 1180 623776-62377b 1175->1180 1181 62382c-623834 PostQuitMessage 1175->1181 1177 6237ab-6237b3 DefWindowProcW 1176->1177 1188 6237b9-6237bf 1177->1188 1217 691e33-691e3a 1178->1217 1182 6237d3-6237d4 1179->1182 1183 6237f6-62381d SetTimer RegisterWindowMessageW 1179->1183 1185 691e88-691e9c call 664ddd 1180->1185 1186 623781-623783 1180->1186 1187 6237f2-6237f4 1181->1187 1189 6237da-6237ed KillTimer call 623847 call 62390f 1182->1189 1190 691da3-691da6 1182->1190 1183->1187 1192 62381f-62382a CreatePopupMenu 1183->1192 1185->1187 1211 691ea2 1185->1211 1193 623836-623840 call 63eb83 1186->1193 1194 623789-62378e 1186->1194 1187->1188 1189->1187 1202 691da8-691daa 1190->1202 1203 691ddc-691dfb MoveWindow 1190->1203 1192->1187 1212 623845 1193->1212 1198 691e6d-691e74 1194->1198 1199 623794-623799 1194->1199 1198->1177 1207 691e7a-691e83 call 65a5f3 1198->1207 1209 691e58-691e68 call 6655bd 1199->1209 1210 62379f-6237a5 1199->1210 1204 691dcb-691dd7 SetFocus 1202->1204 1205 691dac-691daf 1202->1205 1203->1187 1204->1187 1205->1210 1213 691db5-691dc6 call 622ff6 1205->1213 1207->1177 1209->1187 1210->1177 1210->1217 1211->1177 1212->1187 1213->1187 1217->1177 1221 691e40-691e53 call 623847 call 624ffc 1217->1221 1221->1177
                                                      APIs
                                                      • DefWindowProcW.USER32(?,?,?,?), ref: 006237B3
                                                      • KillTimer.USER32(?,00000001), ref: 006237DD
                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00623800
                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0062380B
                                                      • CreatePopupMenu.USER32 ref: 0062381F
                                                      • PostQuitMessage.USER32(00000000), ref: 0062382E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                      • String ID: TaskbarCreated
                                                      • API String ID: 129472671-2362178303
                                                      • Opcode ID: a0c0f96c442f333dc4edbe747801da4d12c723a6463014b545659eaf1c6f7c90
                                                      • Instruction ID: ba408cd25ecafa75176040ba5b81d1104d8606fc83e9b1c1822301e13fc485f3
                                                      • Opcode Fuzzy Hash: a0c0f96c442f333dc4edbe747801da4d12c723a6463014b545659eaf1c6f7c90
                                                      • Instruction Fuzzy Hash: 5A4119F1114AB6A7DF146F28BC49BF9365BFB02300F101119F9029E790DB799E41AF69

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00623E79
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00623E88
                                                      • LoadIconW.USER32(00000063), ref: 00623E9E
                                                      • LoadIconW.USER32(000000A4), ref: 00623EB0
                                                      • LoadIconW.USER32(000000A2), ref: 00623EC2
                                                        • Part of subcall function 00624024: LoadImageW.USER32(00620000,00000063,00000001,00000010,00000010,00000000), ref: 00624048
                                                      • RegisterClassExW.USER32(?), ref: 00623F30
                                                        • Part of subcall function 00623F53: GetSysColorBrush.USER32(0000000F), ref: 00623F86
                                                        • Part of subcall function 00623F53: RegisterClassExW.USER32(00000030), ref: 00623FB0
                                                        • Part of subcall function 00623F53: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00623FC1
                                                        • Part of subcall function 00623F53: InitCommonControlsEx.COMCTL32(?), ref: 00623FDE
                                                        • Part of subcall function 00623F53: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00623FEE
                                                        • Part of subcall function 00623F53: LoadIconW.USER32(000000A9), ref: 00624004
                                                        • Part of subcall function 00623F53: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00624013
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                      • String ID: #$0$AutoIt v3
                                                      • API String ID: 423443420-4155596026
                                                      • Opcode ID: d5de10cfc0bb60d83ec94ae526b502ac7750418d17bedd9aecd18844a68680de
                                                      • Instruction ID: 3dc5580d1f1efe5f9dd0d7bd1af7b7ccb3112cbed3f0e5c56ff18627b522a420
                                                      • Opcode Fuzzy Hash: d5de10cfc0bb60d83ec94ae526b502ac7750418d17bedd9aecd18844a68680de
                                                      • Instruction Fuzzy Hash: EA2151B0E00354ABCB04DFA9EC85A99BFF7EB49310F00511AE205AE3A0D77556449F91

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1234 cab520-cab5ce call ca8f50 1237 cab5d5-cab5fb call cac430 CreateFileW 1234->1237 1240 cab5fd 1237->1240 1241 cab602-cab612 1237->1241 1242 cab74d-cab751 1240->1242 1246 cab619-cab633 VirtualAlloc 1241->1246 1247 cab614 1241->1247 1244 cab793-cab796 1242->1244 1245 cab753-cab757 1242->1245 1248 cab799-cab7a0 1244->1248 1249 cab759-cab75c 1245->1249 1250 cab763-cab767 1245->1250 1253 cab63a-cab651 ReadFile 1246->1253 1254 cab635 1246->1254 1247->1242 1255 cab7a2-cab7ad 1248->1255 1256 cab7f5-cab80a 1248->1256 1249->1250 1251 cab769-cab773 1250->1251 1252 cab777-cab77b 1250->1252 1251->1252 1259 cab78b 1252->1259 1260 cab77d-cab787 1252->1260 1261 cab658-cab698 VirtualAlloc 1253->1261 1262 cab653 1253->1262 1254->1242 1263 cab7af 1255->1263 1264 cab7b1-cab7bd 1255->1264 1257 cab81a-cab822 1256->1257 1258 cab80c-cab817 VirtualFree 1256->1258 1258->1257 1259->1244 1260->1259 1265 cab69a 1261->1265 1266 cab69f-cab6ba call cac680 1261->1266 1262->1242 1263->1256 1267 cab7bf-cab7cf 1264->1267 1268 cab7d1-cab7dd 1264->1268 1265->1242 1274 cab6c5-cab6cf 1266->1274 1270 cab7f3 1267->1270 1271 cab7ea-cab7f0 1268->1271 1272 cab7df-cab7e8 1268->1272 1270->1248 1271->1270 1272->1270 1275 cab702-cab716 call cac490 1274->1275 1276 cab6d1-cab700 call cac680 1274->1276 1282 cab71a-cab71e 1275->1282 1283 cab718 1275->1283 1276->1274 1284 cab72a-cab72e 1282->1284 1285 cab720-cab724 CloseHandle 1282->1285 1283->1242 1286 cab73e-cab747 1284->1286 1287 cab730-cab73b VirtualFree 1284->1287 1285->1284 1286->1237 1286->1242 1287->1286
                                                      APIs
                                                      • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00CAB5F1
                                                      • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00CAB817
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2083471142.0000000000CA8000.00000040.00000020.00020000.00000000.sdmp, Offset: 00CA8000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ca8000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CreateFileFreeVirtual
                                                      • String ID:
                                                      • API String ID: 204039940-0
                                                      • Opcode ID: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                                                      • Instruction ID: 3c1a54e547c235dcc44d10c81bb671352c6eb1fb4fbdad9d85068a7ab6cabf19
                                                      • Opcode Fuzzy Hash: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                                                      • Instruction Fuzzy Hash: F3A11874E0020AEBDB14CFA4C894BEEB7B5BF49309F208559E111BB281D7B59E40DF64

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1343 6249fb-624a25 call 62bcce RegOpenKeyExW 1346 6941cc-6941e3 RegQueryValueExW 1343->1346 1347 624a2b-624a2f 1343->1347 1348 6941e5-694222 call 63f4ea call 6247b7 RegQueryValueExW 1346->1348 1349 694246-69424f RegCloseKey 1346->1349 1354 69423d-694245 call 6247e2 1348->1354 1355 694224-69423b call 626a63 1348->1355 1354->1349 1355->1354
                                                      APIs
                                                      • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00624A1D
                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 006941DB
                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0069421A
                                                      • RegCloseKey.ADVAPI32(?), ref: 00694249
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: QueryValue$CloseOpen
                                                      • String ID: Include$Software\AutoIt v3\AutoIt
                                                      • API String ID: 1586453840-614718249
                                                      • Opcode ID: 56b246316a67a96a307c31b61226fd32905aaae25224f02ab05d660a8dd68158
                                                      • Instruction ID: 4e01f4b93e76ab042bde3647956fa6ef9581cfb111574ef97f021bf058bf5cac
                                                      • Opcode Fuzzy Hash: 56b246316a67a96a307c31b61226fd32905aaae25224f02ab05d660a8dd68158
                                                      • Instruction Fuzzy Hash: 9C116DB5A00118BEEB00EBA4DD86DFF7BADEF05344F001069B502D7191EF70AE429B50

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1370 6236b8-623728 CreateWindowExW * 2 ShowWindow * 2
                                                      APIs
                                                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 006236E6
                                                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00623707
                                                      • ShowWindow.USER32(00000000,?,?,?,?,00623AA3,?), ref: 0062371B
                                                      • ShowWindow.USER32(00000000,?,?,?,?,00623AA3,?), ref: 00623724
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Window$CreateShow
                                                      • String ID: AutoIt v3$edit
                                                      • API String ID: 1584632944-3779509399
                                                      • Opcode ID: 5569c738904f5e58a6ea76a7521f2e66f33eaf0dffb32806c604c1ce891b8bc7
                                                      • Instruction ID: 0cce349fa07d7b5171a83de5cf75186412ed9fe3f60bcbfd26e21f04646e35b3
                                                      • Opcode Fuzzy Hash: 5569c738904f5e58a6ea76a7521f2e66f33eaf0dffb32806c604c1ce891b8bc7
                                                      • Instruction Fuzzy Hash: B4F03A705403D07AEB309B57AC88E672E7FD7C7F60B00101ABA04AE1A0C97118C1EAB0

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1475 cab300-cab419 call ca8f50 call cab1f0 CreateFileW 1482 cab41b 1475->1482 1483 cab420-cab430 1475->1483 1484 cab4d0-cab4d5 1482->1484 1486 cab432 1483->1486 1487 cab437-cab451 VirtualAlloc 1483->1487 1486->1484 1488 cab453 1487->1488 1489 cab455-cab46c ReadFile 1487->1489 1488->1484 1490 cab46e 1489->1490 1491 cab470-cab4aa call cab230 call caa1f0 1489->1491 1490->1484 1496 cab4ac-cab4c1 call cab280 1491->1496 1497 cab4c6-cab4ce ExitProcess 1491->1497 1496->1497 1497->1484
                                                      APIs
                                                        • Part of subcall function 00CAB1F0: Sleep.KERNELBASE(000001F4), ref: 00CAB201
                                                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00CAB40F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2083471142.0000000000CA8000.00000040.00000020.00020000.00000000.sdmp, Offset: 00CA8000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ca8000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CreateFileSleep
                                                      • String ID: EL7D169H9DXU57ZT
                                                      • API String ID: 2694422964-3391708184
                                                      • Opcode ID: 73d772d2490b2ba4759e8e7e463bc30d9d195f924eb00f5ad51005fdedd72903
                                                      • Instruction ID: e390ebb0012fb98b41b9f1f8203fca2fcb8b49182bba5e2dd67cf95ae4aa56f4
                                                      • Opcode Fuzzy Hash: 73d772d2490b2ba4759e8e7e463bc30d9d195f924eb00f5ad51005fdedd72903
                                                      • Instruction Fuzzy Hash: 02516131D0424EDAEF11DBE4C815BEEBB79AF09304F108199E608BB2C1D7751B45DB65

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00625374: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,006E1148,?,006261FF,?,00000000,00000001,00000000), ref: 00625392
                                                        • Part of subcall function 006249FB: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00624A1D
                                                      • _wcscat.LIBCMT ref: 00692D80
                                                      • _wcscat.LIBCMT ref: 00692DB5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: _wcscat$FileModuleNameOpen
                                                      • String ID: 8!n$\$\Include\
                                                      • API String ID: 3592542968-2639341556
                                                      • Opcode ID: f159b9272170ecaf2b7b8e770d325436609c2d235b54c7a5e21883060efe5f76
                                                      • Instruction ID: cc667b0e4712e3af8e51ed30daf9f57c3886cadf29149e40b058413aa969f9f1
                                                      • Opcode Fuzzy Hash: f159b9272170ecaf2b7b8e770d325436609c2d235b54c7a5e21883060efe5f76
                                                      • Instruction Fuzzy Hash: 68518FB14043929BC744EF59E8E18DAB7FFBE59300B40552EF7458B260EB709A48CF56
                                                      APIs
                                                      • _memset.LIBCMT ref: 0062522F
                                                      • _wcscpy.LIBCMT ref: 00625283
                                                      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00625293
                                                      • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00693CB0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: IconLoadNotifyShell_String_memset_wcscpy
                                                      • String ID: Line:
                                                      • API String ID: 1053898822-1585850449
                                                      • Opcode ID: f99e2ebb4d12126f0991527e089282b3242e7691ae774448f51a2dffdae0a4f0
                                                      • Instruction ID: 1718f74159ad80f1506f2a33ce622f91aff7dd8b164b786c729996e06e75d8dc
                                                      • Opcode Fuzzy Hash: f99e2ebb4d12126f0991527e089282b3242e7691ae774448f51a2dffdae0a4f0
                                                      • Instruction Fuzzy Hash: 6131D071408BA0AED370EB60EC46FDE77DAAF45310F00451EF5868A191DB70A658CF9B
                                                      APIs
                                                        • Part of subcall function 006241A9: LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,006239FE,?,00000001), ref: 006241DB
                                                      • _free.LIBCMT ref: 006936B7
                                                      • _free.LIBCMT ref: 006936FE
                                                        • Part of subcall function 0062C833: __wsplitpath.LIBCMT ref: 0062C93E
                                                        • Part of subcall function 0062C833: _wcscpy.LIBCMT ref: 0062C953
                                                        • Part of subcall function 0062C833: _wcscat.LIBCMT ref: 0062C968
                                                        • Part of subcall function 0062C833: SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 0062C978
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: _free$CurrentDirectoryLibraryLoad__wsplitpath_wcscat_wcscpy
                                                      • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                      • API String ID: 805182592-1757145024
                                                      • Opcode ID: dc1023c4fc00c87cd1e3a01c2b208d239a7c6c498cadb933f60b1cf296bf72c6
                                                      • Instruction ID: b07e8caa03eb47d678206c55887e399c9fb0f07f178cdba6f7a651c15c98f5ea
                                                      • Opcode Fuzzy Hash: dc1023c4fc00c87cd1e3a01c2b208d239a7c6c498cadb933f60b1cf296bf72c6
                                                      • Instruction Fuzzy Hash: 7E914B71910229AFCF44EFA4DC919EEB7BABF18310F104429F816AB391DB349A55CF94
                                                      APIs
                                                      • _memset.LIBCMT ref: 00693725
                                                      • GetOpenFileNameW.COMDLG32 ref: 0069376F
                                                        • Part of subcall function 0062660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006253B1,?,?,006261FF,?,00000000,00000001,00000000), ref: 0062662F
                                                        • Part of subcall function 006240A7: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006240C6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Name$Path$FileFullLongOpen_memset
                                                      • String ID: X$t3m
                                                      • API String ID: 3777226403-1971450663
                                                      • Opcode ID: a96dfc765ecd2f7bd5ddc8ede54d7202b402486738f34b076964d3ec45fbe86c
                                                      • Instruction ID: 2fdd731565e8b084daec37561161a2af010123804d1b80cd3e19112e1a3d7ec6
                                                      • Opcode Fuzzy Hash: a96dfc765ecd2f7bd5ddc8ede54d7202b402486738f34b076964d3ec45fbe86c
                                                      • Instruction Fuzzy Hash: B621A171E006A89BCF419F98D8457EE7BFA9F49300F00401AE505AB341DFB45A898F6A
                                                      APIs
                                                      • __getstream.LIBCMT ref: 006434FE
                                                        • Part of subcall function 00647C0E: __getptd_noexit.LIBCMT ref: 00647C0E
                                                      • @_EH4_CallFilterFunc@8.LIBCMT ref: 00643539
                                                      • __wopenfile.LIBCMT ref: 00643549
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CallFilterFunc@8__getptd_noexit__getstream__wopenfile
                                                      • String ID: <G
                                                      • API String ID: 1820251861-2138716496
                                                      • Opcode ID: 57813e7936015757f194dae2e34719a31bbba09b37cbc22c587d2f8367a10684
                                                      • Instruction ID: 66b4c7eb566fdb1082acd7e432ae375defe3ac2adab6fc4b1a237be0bc1ae878
                                                      • Opcode Fuzzy Hash: 57813e7936015757f194dae2e34719a31bbba09b37cbc22c587d2f8367a10684
                                                      • Instruction Fuzzy Hash: E2112970A00326DFDB92BFB48C426AE36E7AF06350B158429F815CB3C1EB30CA1197B1
                                                      APIs
                                                      • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,0063D28B,SwapMouseButtons,00000004,?), ref: 0063D2BC
                                                      • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,0063D28B,SwapMouseButtons,00000004,?,?,?,?,0063C865), ref: 0063D2DD
                                                      • RegCloseKey.KERNELBASE(00000000,?,?,0063D28B,SwapMouseButtons,00000004,?,?,?,?,0063C865), ref: 0063D2FF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID: Control Panel\Mouse
                                                      • API String ID: 3677997916-824357125
                                                      • Opcode ID: fcc1bd5d16d85411a9de481a03db6dd78d5be90b711cf6b57482024a00f38052
                                                      • Instruction ID: 0b2c5d8a930eebaa5118379d695cd7a346184951b3e84ca88ddcda8907f50cd2
                                                      • Opcode Fuzzy Hash: fcc1bd5d16d85411a9de481a03db6dd78d5be90b711cf6b57482024a00f38052
                                                      • Instruction Fuzzy Hash: 71113975611208BFEB209FA4EC84EEF7BBDEF46744F104469F906D7210E631AE419BA0
                                                      APIs
                                                      • CreateProcessW.KERNELBASE(?,00000000), ref: 00CAAA1D
                                                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00CAAA41
                                                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00CAAA63
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2083471142.0000000000CA8000.00000040.00000020.00020000.00000000.sdmp, Offset: 00CA8000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ca8000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                      • String ID:
                                                      • API String ID: 2438371351-0
                                                      • Opcode ID: a5f8eca76df1c4d60a387bf050efe929c827b8bdc82418feca4108ede207e1c1
                                                      • Instruction ID: ed6ea17d9f786da8bc1d9076fc0b03b45920acac33d0885c0f351cbdaf223bc0
                                                      • Opcode Fuzzy Hash: a5f8eca76df1c4d60a387bf050efe929c827b8bdc82418feca4108ede207e1c1
                                                      • Instruction Fuzzy Hash: 98621F30A14259DBEB24CFA4C850BDEB372EF59304F1091A9D11DEB390E7769E81CB5A
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: _memset$__filbuf__getptd_noexit_memcpy_s
                                                      • String ID:
                                                      • API String ID: 3877424927-0
                                                      • Opcode ID: 25276d1f646da7b76298e578b8e053e7e3b96e54df01e447abe6ae266d0f960a
                                                      • Instruction ID: 5e3efb0f2c1efe49c53dceb5b44821c3e415fd8c54eec9430642e6b7e76554a6
                                                      • Opcode Fuzzy Hash: 25276d1f646da7b76298e578b8e053e7e3b96e54df01e447abe6ae266d0f960a
                                                      • Instruction Fuzzy Hash: 0951C5B0A00326EBDB249FA988856AE77B3AF41320F24872DF875963D0D7719F518F44
                                                      APIs
                                                        • Part of subcall function 00624517: _fseek.LIBCMT ref: 0062452F
                                                        • Part of subcall function 0066C56D: _wcscmp.LIBCMT ref: 0066C65D
                                                        • Part of subcall function 0066C56D: _wcscmp.LIBCMT ref: 0066C670
                                                      • _free.LIBCMT ref: 0066C4DD
                                                      • _free.LIBCMT ref: 0066C4E4
                                                      • _free.LIBCMT ref: 0066C54F
                                                        • Part of subcall function 00641C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00647A85), ref: 00641CB1
                                                        • Part of subcall function 00641C9D: GetLastError.KERNEL32(00000000,?,00647A85), ref: 00641CC3
                                                      • _free.LIBCMT ref: 0066C557
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                      • String ID:
                                                      • API String ID: 1552873950-0
                                                      • Opcode ID: 2db9d723d2f1f24614347a7e6fc8c80c315d14cd5ac174f49895e1fbecc6b5fc
                                                      • Instruction ID: 4143781b3ad072bf3ca2fb928447d1750f927e5d29ee0d713e8f80aebfffc4d4
                                                      • Opcode Fuzzy Hash: 2db9d723d2f1f24614347a7e6fc8c80c315d14cd5ac174f49895e1fbecc6b5fc
                                                      • Instruction Fuzzy Hash: B5515EB1A04218AFDF54DF64DC81BADBBBAEF48314F1000AEF259E7251DB715A908F58
                                                      APIs
                                                      • _memset.LIBCMT ref: 0063EBB2
                                                        • Part of subcall function 006251AF: _memset.LIBCMT ref: 0062522F
                                                        • Part of subcall function 006251AF: _wcscpy.LIBCMT ref: 00625283
                                                        • Part of subcall function 006251AF: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00625293
                                                      • KillTimer.USER32(?,00000001,?,?), ref: 0063EC07
                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0063EC16
                                                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00693C88
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                      • String ID:
                                                      • API String ID: 1378193009-0
                                                      • Opcode ID: ed38df0614d84eee9fd883ddddbe93e0701ad8e8cf1e63bf236075cea62ddfaa
                                                      • Instruction ID: 10329fc150e952d4f3b1d061ca1c47df56be61bbe0f3bc3abee92eab18bbba62
                                                      • Opcode Fuzzy Hash: ed38df0614d84eee9fd883ddddbe93e0701ad8e8cf1e63bf236075cea62ddfaa
                                                      • Instruction Fuzzy Hash: 66212C70504B94AFEB329B24C859BEBBBEE9F05308F04104DE29F5A381C3712A84CB51
                                                      APIs
                                                      • GetTempPathW.KERNEL32(00000104,?), ref: 0066C72F
                                                      • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 0066C746
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Temp$FileNamePath
                                                      • String ID: aut
                                                      • API String ID: 3285503233-3010740371
                                                      • Opcode ID: 594705526ef34ce32d6efc3781c704de2384088eb4e2002037e1a294a6b41108
                                                      • Instruction ID: 355e14ddb657fec5e5618acfd7987571b783a84fefb8c18e4c51143f8798a808
                                                      • Opcode Fuzzy Hash: 594705526ef34ce32d6efc3781c704de2384088eb4e2002037e1a294a6b41108
                                                      • Instruction Fuzzy Hash: 4BD05E7550030EABDB10AB90DC0EFCAB76D9700704F0001A17751A51B1DAB0E799CF55
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d8dba31ed7b06bb11adbbf2c815c7b5ce8458b006703a4fa8823d723f9248c85
                                                      • Instruction ID: 22abec497477cc843de967f806c02eb8e79fe6ef64643242ac180d90601cdf87
                                                      • Opcode Fuzzy Hash: d8dba31ed7b06bb11adbbf2c815c7b5ce8458b006703a4fa8823d723f9248c85
                                                      • Instruction Fuzzy Hash: 66F158716083019FCB50DF24C881B6AB7E6BF88314F14892EF9999B392D770E945CF82
                                                      APIs
                                                      • _memset.LIBCMT ref: 00625022
                                                      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 006250CB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell__memset
                                                      • String ID:
                                                      • API String ID: 928536360-0
                                                      • Opcode ID: 03c0ba1d1aa880b11092fe5e92e16ea531798a590a4c70055bec224b14bd0803
                                                      • Instruction ID: 99b4c6d9a7871402618e64861e081056c623e03987b82c5df79f74da1ad03e34
                                                      • Opcode Fuzzy Hash: 03c0ba1d1aa880b11092fe5e92e16ea531798a590a4c70055bec224b14bd0803
                                                      • Instruction Fuzzy Hash: F4318DB0604B118FC720DF24E8856D7BBE9FF49304F00092EE69A8A250E7716948CF96
                                                      APIs
                                                      • __FF_MSGBANNER.LIBCMT ref: 00643973
                                                        • Part of subcall function 006481C2: __NMSG_WRITE.LIBCMT ref: 006481E9
                                                        • Part of subcall function 006481C2: __NMSG_WRITE.LIBCMT ref: 006481F3
                                                      • __NMSG_WRITE.LIBCMT ref: 0064397A
                                                        • Part of subcall function 0064821F: GetModuleFileNameW.KERNEL32(00000000,006E0312,00000104,00000000,00000001,00000000), ref: 006482B1
                                                        • Part of subcall function 0064821F: ___crtMessageBoxW.LIBCMT ref: 0064835F
                                                        • Part of subcall function 00641145: ___crtCorExitProcess.LIBCMT ref: 0064114B
                                                        • Part of subcall function 00641145: ExitProcess.KERNEL32 ref: 00641154
                                                        • Part of subcall function 00647C0E: __getptd_noexit.LIBCMT ref: 00647C0E
                                                      • RtlAllocateHeap.NTDLL(00C60000,00000000,00000001,00000001,00000000,?,?,0063F507,?,0000000E), ref: 0064399F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                      • String ID:
                                                      • API String ID: 1372826849-0
                                                      • Opcode ID: 3a5aa6866305e84fef53305256e9e2b7ffd8382d560159a48cc5cb7894167779
                                                      • Instruction ID: db68639ced7a010e6d24b93cc31b85accf1dcf7bb74f22ee48e539a6637b1649
                                                      • Opcode Fuzzy Hash: 3a5aa6866305e84fef53305256e9e2b7ffd8382d560159a48cc5cb7894167779
                                                      • Instruction Fuzzy Hash: 0B0192313453619EE7613B74DC86A6E238B9F82760F21102AF5059B382EBF49D4186A4
                                                      APIs
                                                      • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,0066C385,?,?,?,?,?,00000004), ref: 0066C6F2
                                                      • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,0066C385,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 0066C708
                                                      • CloseHandle.KERNEL32(00000000,?,0066C385,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 0066C70F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: File$CloseCreateHandleTime
                                                      • String ID:
                                                      • API String ID: 3397143404-0
                                                      • Opcode ID: 488ed37106b93a7ebfa8f0a0ce799b7c3711ca340d4ba6c4279938c2b7f521d3
                                                      • Instruction ID: 537015a686a47e623370e35a4ffb72b38940829ff4c7e148b1ffd84257cdc857
                                                      • Opcode Fuzzy Hash: 488ed37106b93a7ebfa8f0a0ce799b7c3711ca340d4ba6c4279938c2b7f521d3
                                                      • Instruction Fuzzy Hash: 4CE08632240214B7DB212B54AC09FDA7F1AEB06770F104110FB55694E097B139118B98
                                                      APIs
                                                      • _free.LIBCMT ref: 0066BB72
                                                        • Part of subcall function 00641C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00647A85), ref: 00641CB1
                                                        • Part of subcall function 00641C9D: GetLastError.KERNEL32(00000000,?,00647A85), ref: 00641CC3
                                                      • _free.LIBCMT ref: 0066BB83
                                                      • _free.LIBCMT ref: 0066BB95
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 9be2b5beef45e3014043d3abdf219173afad32993680376f9e1db3d5b0d03a7e
                                                      • Instruction ID: 97c201832ebedce9c74b966717b0424f02712482113648a4c1a62b486d42bed7
                                                      • Opcode Fuzzy Hash: 9be2b5beef45e3014043d3abdf219173afad32993680376f9e1db3d5b0d03a7e
                                                      • Instruction Fuzzy Hash: 13E0C2A1200701C2CB206538AE84EF313CE0F05310704181DB419EB242CF28F8C085A8
                                                      APIs
                                                        • Part of subcall function 006222A4: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,006224F1), ref: 00622303
                                                      • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 006225A1
                                                      • CoInitialize.OLE32(00000000), ref: 00622618
                                                      • CloseHandle.KERNEL32(00000000), ref: 0069503A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Handle$CloseInitializeMessageRegisterWindow
                                                      • String ID:
                                                      • API String ID: 3815369404-0
                                                      • Opcode ID: d0bfe9926355c3e49bbf8efc04e4177ed4adc1e94ea74529e0ad0dba18d18e70
                                                      • Instruction ID: 974229ab5689e4e82fc6ab052e4de6abad19fbf96f0194229ecc2beb237fbf71
                                                      • Opcode Fuzzy Hash: d0bfe9926355c3e49bbf8efc04e4177ed4adc1e94ea74529e0ad0dba18d18e70
                                                      • Instruction Fuzzy Hash: 2971AEB49113C58F8704EF6AACD0499BBA7BB9B340790612ED219CF7B1DB304684EF59
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: __fread_nolock
                                                      • String ID: EA06
                                                      • API String ID: 2638373210-3962188686
                                                      • Opcode ID: dd0e60154d53b503212399c832cfaebe371bc9680e839c62812011679acdb419
                                                      • Instruction ID: 19c6482a9161d655954e49b2ca9f10d1de828a321065c92d98e178c210eb9f43
                                                      • Opcode Fuzzy Hash: dd0e60154d53b503212399c832cfaebe371bc9680e839c62812011679acdb419
                                                      • Instruction Fuzzy Hash: 9301B9719042187EDB58C798C856FEDBBF89B15301F00455EF552D6281E574A7048B60
                                                      APIs
                                                      • _strcat.LIBCMT ref: 006808FD
                                                        • Part of subcall function 0062936C: __swprintf.LIBCMT ref: 006293AB
                                                        • Part of subcall function 0062936C: __itow.LIBCMT ref: 006293DF
                                                      • _wcscpy.LIBCMT ref: 0068098C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: __itow__swprintf_strcat_wcscpy
                                                      • String ID:
                                                      • API String ID: 1012013722-0
                                                      • Opcode ID: 6f3e548453f2c8a23d791f7ab5c08b669d44879241532baa782505ac412134de
                                                      • Instruction ID: c5a8887b175d0b9a2445700e28f1436933d6fe1a1d065f865279847a1b6dabea
                                                      • Opcode Fuzzy Hash: 6f3e548453f2c8a23d791f7ab5c08b669d44879241532baa782505ac412134de
                                                      • Instruction Fuzzy Hash: BB915934A00615DFDB98EF18C4919A9B7E6EF49310B51856DE81ACF3A2DB30ED45CF84
                                                      APIs
                                                      • IsThemeActive.UXTHEME ref: 00623A73
                                                        • Part of subcall function 00641405: __lock.LIBCMT ref: 0064140B
                                                        • Part of subcall function 00623ADB: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00623AF3
                                                        • Part of subcall function 00623ADB: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00623B08
                                                        • Part of subcall function 00623D19: GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00623AA3,?), ref: 00623D45
                                                        • Part of subcall function 00623D19: IsDebuggerPresent.KERNEL32(?,?,?,?,00623AA3,?), ref: 00623D57
                                                        • Part of subcall function 00623D19: GetFullPathNameW.KERNEL32(00007FFF,?,?,006E1148,006E1130,?,?,?,?,00623AA3,?), ref: 00623DC8
                                                        • Part of subcall function 00623D19: SetCurrentDirectoryW.KERNEL32(?,?,?,00623AA3,?), ref: 00623E48
                                                      • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00623AB3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme__lock
                                                      • String ID:
                                                      • API String ID: 924797094-0
                                                      • Opcode ID: bf510fe456df6c281039239aa90cbd8e02c52f08a21e967ffafd2019ae38850f
                                                      • Instruction ID: 14b570cc02cacc2b66ede57d9f283e1e4e3afbf4f0495988cbb535f9c37716b6
                                                      • Opcode Fuzzy Hash: bf510fe456df6c281039239aa90cbd8e02c52f08a21e967ffafd2019ae38850f
                                                      • Instruction Fuzzy Hash: CB11C0719043919BC740EF25E88594ABBEBEF96310F00591EF5858B2A1DB709684CF96
                                                      APIs
                                                      • ___lock_fhandle.LIBCMT ref: 0064EA29
                                                      • __close_nolock.LIBCMT ref: 0064EA42
                                                        • Part of subcall function 00647BDA: __getptd_noexit.LIBCMT ref: 00647BDA
                                                        • Part of subcall function 00647C0E: __getptd_noexit.LIBCMT ref: 00647C0E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: __getptd_noexit$___lock_fhandle__close_nolock
                                                      • String ID:
                                                      • API String ID: 1046115767-0
                                                      • Opcode ID: 7a5a2ed653f856a35dfb4e5431ee2f4b7b820912d3c601209c11a8c3298a69bb
                                                      • Instruction ID: cfdd95df6369772dcb73f08fb98c872857fa3848b14b8f5d3604966a37320fe2
                                                      • Opcode Fuzzy Hash: 7a5a2ed653f856a35dfb4e5431ee2f4b7b820912d3c601209c11a8c3298a69bb
                                                      • Instruction Fuzzy Hash: 7311A572809650DED751BFA4C8813587A63BF82331F264748E4315F2E3CBB58D8187A9
                                                      APIs
                                                        • Part of subcall function 0064395C: __FF_MSGBANNER.LIBCMT ref: 00643973
                                                        • Part of subcall function 0064395C: __NMSG_WRITE.LIBCMT ref: 0064397A
                                                        • Part of subcall function 0064395C: RtlAllocateHeap.NTDLL(00C60000,00000000,00000001,00000001,00000000,?,?,0063F507,?,0000000E), ref: 0064399F
                                                      • std::exception::exception.LIBCMT ref: 0063F51E
                                                      • __CxxThrowException@8.LIBCMT ref: 0063F533
                                                        • Part of subcall function 00646805: RaiseException.KERNEL32(?,?,0000000E,006D6A30,?,?,?,0063F538,0000000E,006D6A30,?,00000001), ref: 00646856
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                      • String ID:
                                                      • API String ID: 3902256705-0
                                                      • Opcode ID: f179401b387194fae622dba4559b732d959c498317f44f0a611f1333671c4d40
                                                      • Instruction ID: eb97bd4f7981a5efd3482d087c43f6cb68bd6d2bd6e06ee88d271061816cea4b
                                                      • Opcode Fuzzy Hash: f179401b387194fae622dba4559b732d959c498317f44f0a611f1333671c4d40
                                                      • Instruction Fuzzy Hash: E3F0C83150421E67D744BF98DC019DE7BEF9F02364F60402AFA09D2692DBB0DA4086EA
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: __lock_file_memset
                                                      • String ID:
                                                      • API String ID: 26237723-0
                                                      • Opcode ID: a3e31e6d0d1fafc7c647bbd2f376f1eb7d0fbc1ded645c48cf4451cfb29c96ac
                                                      • Instruction ID: dfd37228428f148ad6780e2971859347c8738b64a785ebf1b66ef86d25f0dc00
                                                      • Opcode Fuzzy Hash: a3e31e6d0d1fafc7c647bbd2f376f1eb7d0fbc1ded645c48cf4451cfb29c96ac
                                                      • Instruction Fuzzy Hash: 8C017C71800219EECF66AFA5CC029DEBB63AF81320F15822DF824563A1D7318B61DB95
                                                      APIs
                                                        • Part of subcall function 00647C0E: __getptd_noexit.LIBCMT ref: 00647C0E
                                                      • __lock_file.LIBCMT ref: 00643629
                                                        • Part of subcall function 00644E1C: __lock.LIBCMT ref: 00644E3F
                                                      • __fclose_nolock.LIBCMT ref: 00643634
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                      • String ID:
                                                      • API String ID: 2800547568-0
                                                      • Opcode ID: 60308c76350ebe99f04ecf122af138fd9867531f30f4a46e6d15b1b9f3cd679e
                                                      • Instruction ID: 74a9e3bd3965e9c125d077b222c049d76c2be113ed72160e0f7b264489437206
                                                      • Opcode Fuzzy Hash: 60308c76350ebe99f04ecf122af138fd9867531f30f4a46e6d15b1b9f3cd679e
                                                      • Instruction Fuzzy Hash: 3EF09071801625AADB517F65C8027AE7AA36F42330F26810DF425AB3C1CB788A019B5A
                                                      APIs
                                                      • CreateProcessW.KERNELBASE(?,00000000), ref: 00CAAA1D
                                                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00CAAA41
                                                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00CAAA63
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2083471142.0000000000CA8000.00000040.00000020.00020000.00000000.sdmp, Offset: 00CA8000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ca8000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                      • String ID:
                                                      • API String ID: 2438371351-0
                                                      • Opcode ID: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                                                      • Instruction ID: 929da3f2dba4361e125b6db5dc6c5ca19f74ce8e708bad01d1b59f44cd70d397
                                                      • Opcode Fuzzy Hash: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                                                      • Instruction Fuzzy Hash: 2C12DE24E24658C6EB24DF64D8507DEB232EF69300F1090E9910DEB7A5E77A4F81CF5A
                                                      APIs
                                                      • __flush.LIBCMT ref: 00642A0B
                                                        • Part of subcall function 00647C0E: __getptd_noexit.LIBCMT ref: 00647C0E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: __flush__getptd_noexit
                                                      • String ID:
                                                      • API String ID: 4101623367-0
                                                      • Opcode ID: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                                      • Instruction ID: e6b15e57d878af84ff71fc189714c4fb0fba44f058bbd2f6874d20b0836c8108
                                                      • Opcode Fuzzy Hash: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                                      • Instruction Fuzzy Hash: B8419271600707AFDB288EAAC8A05AE7BA7AF85360B74852DF855C7340EB71DD818B44
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ProtectVirtual
                                                      • String ID:
                                                      • API String ID: 544645111-0
                                                      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                      • Instruction ID: c1cd7d5de5d401efb5eea647d05ca9a930ac62803718d9e8820bbe43213deb4c
                                                      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                      • Instruction Fuzzy Hash: 2D31B574A001059BD718DF58C4909A9FBA6FF49340F6486A5E40ADF396DB32EDC2CBE0
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID:
                                                      • API String ID: 269201875-0
                                                      • Opcode ID: 1a83dab5c57fc0b33c6ddf4ea32eeefbb1c1a952cdcf60c7bc9915556cd8d9d0
                                                      • Instruction ID: 3a68fe533b48d34fe30300ba10e71e65653b1432dd8a3ff0c44c0cfffbb410e3
                                                      • Opcode Fuzzy Hash: 1a83dab5c57fc0b33c6ddf4ea32eeefbb1c1a952cdcf60c7bc9915556cd8d9d0
                                                      • Instruction Fuzzy Hash: AC31C475104A24DFDF41AF00D09066E77B2FF48320F10894AEA951F386D774A90ACFD6
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ClearVariant
                                                      • String ID:
                                                      • API String ID: 1473721057-0
                                                      • Opcode ID: 7c9e3ea76cb8eba3376b8a0c4ae6b26c132de238115b8f7590d7c78cff025e40
                                                      • Instruction ID: d7271179794e36846c1884ac5e6de758d3661545510079d570263c25ec6b4857
                                                      • Opcode Fuzzy Hash: 7c9e3ea76cb8eba3376b8a0c4ae6b26c132de238115b8f7590d7c78cff025e40
                                                      • Instruction Fuzzy Hash: 27417E705046118FEB24CF18C484B1ABBE2BF45314F1989ACE99A4B762C776F846CF92
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: __getptd_noexit
                                                      • String ID:
                                                      • API String ID: 3074181302-0
                                                      • Opcode ID: 0718f5e1a5540f167a2d882c854f38a3e97cf9afe5d0f2c9b46201b7d8a152ff
                                                      • Instruction ID: 0a3bb492982db755c69dc0cbcb83a00dc6b50e4edc1e85767a574c21af6bbb0d
                                                      • Opcode Fuzzy Hash: 0718f5e1a5540f167a2d882c854f38a3e97cf9afe5d0f2c9b46201b7d8a152ff
                                                      • Instruction Fuzzy Hash: FB216F72C04A509FD7627FA8CC853587A63BF82335F260648F4714F2E2DBB58D018BA9
                                                      APIs
                                                        • Part of subcall function 00624214: FreeLibrary.KERNEL32(00000000,?), ref: 00624247
                                                      • LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,006239FE,?,00000001), ref: 006241DB
                                                        • Part of subcall function 00624291: FreeLibrary.KERNEL32(00000000), ref: 006242C4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Library$Free$Load
                                                      • String ID:
                                                      • API String ID: 2391024519-0
                                                      • Opcode ID: ac99c153198e30e32355ca9a175c20a4636959a4d9afd14d0efa8a272c978f7b
                                                      • Instruction ID: 602f0a5d6f655d0aefd1995e5530478d067002b70b166840d5e69c334baa959d
                                                      • Opcode Fuzzy Hash: ac99c153198e30e32355ca9a175c20a4636959a4d9afd14d0efa8a272c978f7b
                                                      • Instruction Fuzzy Hash: A011C131600626EACB14BB71EC16FAE77EB9F40700F10842DB596AA181DE719B019F68
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ClearVariant
                                                      • String ID:
                                                      • API String ID: 1473721057-0
                                                      • Opcode ID: 506b3cb55a8c9d97b7a6219902a296625ad51dbbb019c3110a9e2f82bdcbbe64
                                                      • Instruction ID: 4c25e04b54ef8a815cb50902929fa71a52787675ab04653677eb051ad64fbd6c
                                                      • Opcode Fuzzy Hash: 506b3cb55a8c9d97b7a6219902a296625ad51dbbb019c3110a9e2f82bdcbbe64
                                                      • Instruction Fuzzy Hash: 6E2127705086018FEB64DF64C454B5ABBE2BF85304F14496CE59A4B721C731F84ACF96
                                                      APIs
                                                      • ___lock_fhandle.LIBCMT ref: 0064AFC0
                                                        • Part of subcall function 00647BDA: __getptd_noexit.LIBCMT ref: 00647BDA
                                                        • Part of subcall function 00647C0E: __getptd_noexit.LIBCMT ref: 00647C0E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: __getptd_noexit$___lock_fhandle
                                                      • String ID:
                                                      • API String ID: 1144279405-0
                                                      • Opcode ID: 8e6529ee29cd69890a622d5dc241fc0b5f52238bfe3ac3d9d592a9ec9a0573b4
                                                      • Instruction ID: be7269a3dcb8f4bea4765130ba868c0e245e3ef72b496a2ca19f5261ceb556fe
                                                      • Opcode Fuzzy Hash: 8e6529ee29cd69890a622d5dc241fc0b5f52238bfe3ac3d9d592a9ec9a0573b4
                                                      • Instruction Fuzzy Hash: C711C4728046409FD7527FE4C8817993A63AF82732F155748F4304F2E2C7B4CD418BAA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: 6835a613e9910970744cf47f90ff2063449a5087be5f2ce099398601ed1c7b70
                                                      • Instruction ID: fbbde4b10966f8ddae851db0b5304c4a40b91902e2affe9e851817914dfd3e70
                                                      • Opcode Fuzzy Hash: 6835a613e9910970744cf47f90ff2063449a5087be5f2ce099398601ed1c7b70
                                                      • Instruction Fuzzy Hash: 7B01863140051AEECF44EF64D8918FEBB7AAF10304F008029B55197195EB309B49DF64
                                                      APIs
                                                      • __lock_file.LIBCMT ref: 00642AED
                                                        • Part of subcall function 00647C0E: __getptd_noexit.LIBCMT ref: 00647C0E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: __getptd_noexit__lock_file
                                                      • String ID:
                                                      • API String ID: 2597487223-0
                                                      • Opcode ID: f71793428127870d021e9e84b789fe4d6604de324e674c441479613a30224a00
                                                      • Instruction ID: 1c38f243bcf672dea466b017e9c2b3f86f182520ccf85f3a6817ab76fbbaad28
                                                      • Opcode Fuzzy Hash: f71793428127870d021e9e84b789fe4d6604de324e674c441479613a30224a00
                                                      • Instruction Fuzzy Hash: 9AF0F631940206EBDF71AF75CC063DF3AA3BF01310F658419F8109B291C7788AA2DB55
                                                      APIs
                                                      • FreeLibrary.KERNEL32(?,?,?,?,?,006239FE,?,00000001), ref: 00624286
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID:
                                                      • API String ID: 3664257935-0
                                                      • Opcode ID: c7df2fccb63f4f035647dac9003fd0d7925571e34e036e43570f18127e32ee08
                                                      • Instruction ID: 87edab9e3c262d747a51e85f089f295aec9790f6bb1b57393b3f63ef97cc97ac
                                                      • Opcode Fuzzy Hash: c7df2fccb63f4f035647dac9003fd0d7925571e34e036e43570f18127e32ee08
                                                      • Instruction Fuzzy Hash: 8CF0307150AB22CFCB349F66E490856B7E6FF043153248A3EF1D686610CB719A40DF50
                                                      APIs
                                                      • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006240C6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: LongNamePath
                                                      • String ID:
                                                      • API String ID: 82841172-0
                                                      • Opcode ID: 6016a02ea0bb43f2769d8badc10635cc9c5b9d31301a457e121af91e3b5ef4ed
                                                      • Instruction ID: 689ec7239aff1933ab28eaea54156232ee64ca795afbeacac777ca709086e954
                                                      • Opcode Fuzzy Hash: 6016a02ea0bb43f2769d8badc10635cc9c5b9d31301a457e121af91e3b5ef4ed
                                                      • Instruction Fuzzy Hash: DAE0C236A002245BCB11A758DC46FEA77AEDF8C6A0F0900B9F909E7244DA74AD818A94
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: __fread_nolock
                                                      • String ID:
                                                      • API String ID: 2638373210-0
                                                      • Opcode ID: 3cca4198d2bc13ecada8dba30311a83a0df564d107d747b73ddd6f796e1577fd
                                                      • Instruction ID: dbfb885207e9341801d43e33528bdd40848afbb6db2fff8cde88908cad7af98f
                                                      • Opcode Fuzzy Hash: 3cca4198d2bc13ecada8dba30311a83a0df564d107d747b73ddd6f796e1577fd
                                                      • Instruction Fuzzy Hash: 2CE092B0104B009FDB348A24D800BE377E1EF05305F00081CF2AAC7341EB6278818659
                                                      APIs
                                                      • Sleep.KERNELBASE(000001F4), ref: 00CAB201
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2083471142.0000000000CA8000.00000040.00000020.00020000.00000000.sdmp, Offset: 00CA8000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ca8000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID:
                                                      • API String ID: 3472027048-0
                                                      • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                      • Instruction ID: c1d8d645c63b1945a55655ee6233ca2b6c12281df8eb5d8dd6ceaf71e4cbbac0
                                                      • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                      • Instruction Fuzzy Hash: ACE0BF7498010EEFDB00EFA4D5496DE7BB4EF04301F1006A1FD05D7681DB309E548A62
                                                      APIs
                                                      • Sleep.KERNELBASE(000001F4), ref: 00CAB201
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2083471142.0000000000CA8000.00000040.00000020.00020000.00000000.sdmp, Offset: 00CA8000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_ca8000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID:
                                                      • API String ID: 3472027048-0
                                                      • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                      • Instruction ID: ba9e288919eaab009bac874a8d4bbc665d7fc83199f1114c55da878a65bcd270
                                                      • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                      • Instruction Fuzzy Hash: 3BE0E67498010EDFDB00EFB4D54969E7FB4EF04301F100261FD05D2281D7309D508A62
                                                      APIs
                                                        • Part of subcall function 0063B34E: GetWindowLongW.USER32(?,000000EB), ref: 0063B35F
                                                      • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?,?), ref: 0068F87D
                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0068F8DC
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 0068F919
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0068F940
                                                      • SendMessageW.USER32 ref: 0068F966
                                                      • _wcsncpy.LIBCMT ref: 0068F9D2
                                                      • GetKeyState.USER32(00000011), ref: 0068F9F3
                                                      • GetKeyState.USER32(00000009), ref: 0068FA00
                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0068FA16
                                                      • GetKeyState.USER32(00000010), ref: 0068FA20
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0068FA4F
                                                      • SendMessageW.USER32 ref: 0068FA72
                                                      • SendMessageW.USER32(?,00001030,?,0068E059), ref: 0068FB6F
                                                      • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?,?), ref: 0068FB85
                                                      • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0068FB96
                                                      • SetCapture.USER32(?), ref: 0068FB9F
                                                      • ClientToScreen.USER32(?,?), ref: 0068FC03
                                                      • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0068FC0F
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?,?), ref: 0068FC29
                                                      • ReleaseCapture.USER32 ref: 0068FC34
                                                      • GetCursorPos.USER32(?), ref: 0068FC69
                                                      • ScreenToClient.USER32(?,?), ref: 0068FC76
                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 0068FCD8
                                                      • SendMessageW.USER32 ref: 0068FD02
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 0068FD41
                                                      • SendMessageW.USER32 ref: 0068FD6C
                                                      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0068FD84
                                                      • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0068FD8F
                                                      • GetCursorPos.USER32(?), ref: 0068FDB0
                                                      • ScreenToClient.USER32(?,?), ref: 0068FDBD
                                                      • GetParent.USER32(?), ref: 0068FDD9
                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 0068FE3F
                                                      • SendMessageW.USER32 ref: 0068FE6F
                                                      • ClientToScreen.USER32(?,?), ref: 0068FEC5
                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0068FEF1
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 0068FF19
                                                      • SendMessageW.USER32 ref: 0068FF3C
                                                      • ClientToScreen.USER32(?,?), ref: 0068FF86
                                                      • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0068FFB6
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 0069004B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$ClientScreen$Image$CursorDragList_LongStateWindow$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                      • String ID: @GUI_DRAGID$F
                                                      • API String ID: 2516578528-4164748364
                                                      • Opcode ID: df835258f219fe08c573b56af3f0f6db22e7825860d17b4bcdb11fa7292ef411
                                                      • Instruction ID: eef0b5c60282ebd7ec2b63587baa31c034c27bfd0e770e016ce0e54b07a76bf2
                                                      • Opcode Fuzzy Hash: df835258f219fe08c573b56af3f0f6db22e7825860d17b4bcdb11fa7292ef411
                                                      • Instruction Fuzzy Hash: 2532ADB4604345EFDB10EF64C884BAABBBAFF4A354F140629F6558B2A1C731EC51CB51
                                                      APIs
                                                      • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 0068B1CD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: %d/%02d/%02d
                                                      • API String ID: 3850602802-328681919
                                                      • Opcode ID: bcf43a33319389405e52c65758bfa2841ba4c4dc86f36d7550a8c20800c12bde
                                                      • Instruction ID: 562a7f8307d7a36f29a6ce42968aa45be3cea356db253d323391df9b570c0f7b
                                                      • Opcode Fuzzy Hash: bcf43a33319389405e52c65758bfa2841ba4c4dc86f36d7550a8c20800c12bde
                                                      • Instruction Fuzzy Hash: 4B12E171500218ABEB24AF64DC49FAE7BBAFF45310F14521AFA1ADB2D1DB709902CF51
                                                      APIs
                                                      • GetForegroundWindow.USER32(00000000,00000000), ref: 0063EB4A
                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00693AEA
                                                      • IsIconic.USER32(000000FF), ref: 00693AF3
                                                      • ShowWindow.USER32(000000FF,00000009), ref: 00693B00
                                                      • SetForegroundWindow.USER32(000000FF), ref: 00693B0A
                                                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00693B20
                                                      • GetCurrentThreadId.KERNEL32 ref: 00693B27
                                                      • GetWindowThreadProcessId.USER32(000000FF,00000000), ref: 00693B33
                                                      • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00693B44
                                                      • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00693B4C
                                                      • AttachThreadInput.USER32(00000000,?,00000001), ref: 00693B54
                                                      • SetForegroundWindow.USER32(000000FF), ref: 00693B57
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00693B6C
                                                      • keybd_event.USER32(00000012,00000000), ref: 00693B77
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00693B81
                                                      • keybd_event.USER32(00000012,00000000), ref: 00693B86
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00693B8F
                                                      • keybd_event.USER32(00000012,00000000), ref: 00693B94
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00693B9E
                                                      • keybd_event.USER32(00000012,00000000), ref: 00693BA3
                                                      • SetForegroundWindow.USER32(000000FF), ref: 00693BA6
                                                      • AttachThreadInput.USER32(000000FF,?,00000000), ref: 00693BCD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                      • String ID: Shell_TrayWnd
                                                      • API String ID: 4125248594-2988720461
                                                      • Opcode ID: 3c219c91b6a1c312e6891bca0e866f3e060172f7e25366550b4a110a8d983217
                                                      • Instruction ID: 0b17f23e219b7f259cecb7390ebc989e28592b401ecd3bc521fbf29d3d5c6dcf
                                                      • Opcode Fuzzy Hash: 3c219c91b6a1c312e6891bca0e866f3e060172f7e25366550b4a110a8d983217
                                                      • Instruction Fuzzy Hash: 3B31A971A403287BEF306F658C49FBF7E6EEB45B50F104015FA05EA6D0D6B16D01AEA0
                                                      APIs
                                                        • Part of subcall function 0065B134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0065B180
                                                        • Part of subcall function 0065B134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0065B1AD
                                                        • Part of subcall function 0065B134: GetLastError.KERNEL32 ref: 0065B1BA
                                                      • _memset.LIBCMT ref: 0065AD08
                                                      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 0065AD5A
                                                      • CloseHandle.KERNEL32(?), ref: 0065AD6B
                                                      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 0065AD82
                                                      • GetProcessWindowStation.USER32 ref: 0065AD9B
                                                      • SetProcessWindowStation.USER32(00000000), ref: 0065ADA5
                                                      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 0065ADBF
                                                        • Part of subcall function 0065AB84: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,0065ACC0), ref: 0065AB99
                                                        • Part of subcall function 0065AB84: CloseHandle.KERNEL32(?,?,0065ACC0), ref: 0065ABAB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                      • String ID: $H*m$default$winsta0
                                                      • API String ID: 2063423040-848939072
                                                      • Opcode ID: b8cc8f9710646e2727d6fbce975e22f0528646af80a703fd539a007b98167989
                                                      • Instruction ID: 47ee46d0f136b62735a8c808eb0e45dddf2c9202384a5a2296eab53bdda7b172
                                                      • Opcode Fuzzy Hash: b8cc8f9710646e2727d6fbce975e22f0528646af80a703fd539a007b98167989
                                                      • Instruction Fuzzy Hash: D081ADB1800209AFDF119FE4DC45AEEBBBAFF09305F044219FD15A6261D7319E49DB62
                                                      APIs
                                                        • Part of subcall function 00666EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00665FA6,?), ref: 00666ED8
                                                        • Part of subcall function 00666EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00665FA6,?), ref: 00666EF1
                                                        • Part of subcall function 0066725E: __wsplitpath.LIBCMT ref: 0066727B
                                                        • Part of subcall function 0066725E: __wsplitpath.LIBCMT ref: 0066728E
                                                        • Part of subcall function 006672CB: GetFileAttributesW.KERNEL32(?,00666019), ref: 006672CC
                                                      • _wcscat.LIBCMT ref: 00666149
                                                      • _wcscat.LIBCMT ref: 00666167
                                                      • __wsplitpath.LIBCMT ref: 0066618E
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 006661A4
                                                      • _wcscpy.LIBCMT ref: 00666209
                                                      • _wcscat.LIBCMT ref: 0066621C
                                                      • _wcscat.LIBCMT ref: 0066622F
                                                      • lstrcmpiW.KERNEL32(?,?), ref: 0066625D
                                                      • DeleteFileW.KERNEL32(?), ref: 0066626E
                                                      • MoveFileW.KERNEL32(?,?), ref: 00666289
                                                      • MoveFileW.KERNEL32(?,?), ref: 00666298
                                                      • CopyFileW.KERNEL32(?,?,00000000), ref: 006662AD
                                                      • DeleteFileW.KERNEL32(?), ref: 006662BE
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 006662E1
                                                      • FindClose.KERNEL32(00000000), ref: 006662FD
                                                      • FindClose.KERNEL32(00000000), ref: 0066630B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: File$Find_wcscat$__wsplitpath$CloseDeleteFullMoveNamePath$AttributesCopyFirstNext_wcscpylstrcmpi
                                                      • String ID: \*.*
                                                      • API String ID: 1917200108-1173974218
                                                      • Opcode ID: 9f384f1c8335081c0a7e95c6b026b734f254b3b03e7dd492b1a54febd53e4a6b
                                                      • Instruction ID: 6b92704d8e8d59379f2eab640e4b6c624c37e679ac92d6c53bd88551250da90a
                                                      • Opcode Fuzzy Hash: 9f384f1c8335081c0a7e95c6b026b734f254b3b03e7dd492b1a54febd53e4a6b
                                                      • Instruction Fuzzy Hash: B551017290811CAACB21EB95DC55DDBB7BEAF05300F0501EAF545E2141DE36AB89CFA8
                                                      APIs
                                                      • OpenClipboard.USER32(006BDC00), ref: 00676B36
                                                      • IsClipboardFormatAvailable.USER32(0000000D), ref: 00676B44
                                                      • GetClipboardData.USER32(0000000D), ref: 00676B4C
                                                      • CloseClipboard.USER32 ref: 00676B58
                                                      • GlobalLock.KERNEL32(00000000), ref: 00676B74
                                                      • CloseClipboard.USER32 ref: 00676B7E
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00676B93
                                                      • IsClipboardFormatAvailable.USER32(00000001), ref: 00676BA0
                                                      • GetClipboardData.USER32(00000001), ref: 00676BA8
                                                      • GlobalLock.KERNEL32(00000000), ref: 00676BB5
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00676BE9
                                                      • CloseClipboard.USER32 ref: 00676CF6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                      • String ID:
                                                      • API String ID: 3222323430-0
                                                      • Opcode ID: 8dc59a3881aa3fe2c5fa8b79bb8747b325bf7c927ce014ff8f1ad6b566c4e925
                                                      • Instruction ID: cdd22000a46f8f7569e8eb081f3eade0260b2b403f4fc936f03598831ae5155e
                                                      • Opcode Fuzzy Hash: 8dc59a3881aa3fe2c5fa8b79bb8747b325bf7c927ce014ff8f1ad6b566c4e925
                                                      • Instruction Fuzzy Hash: A251BF31244601ABD301BF60DD46FAE77AAAF85B11F00902DF68AD62E1DF70E905CF66
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 0066F62B
                                                      • FindClose.KERNEL32(00000000), ref: 0066F67F
                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0066F6A4
                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0066F6BB
                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 0066F6E2
                                                      • __swprintf.LIBCMT ref: 0066F72E
                                                      • __swprintf.LIBCMT ref: 0066F767
                                                      • __swprintf.LIBCMT ref: 0066F7BB
                                                        • Part of subcall function 0064172B: __woutput_l.LIBCMT ref: 00641784
                                                      • __swprintf.LIBCMT ref: 0066F809
                                                      • __swprintf.LIBCMT ref: 0066F858
                                                      • __swprintf.LIBCMT ref: 0066F8A7
                                                      • __swprintf.LIBCMT ref: 0066F8F6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: __swprintf$FileTime$FindLocal$CloseFirstSystem__woutput_l
                                                      • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                      • API String ID: 835046349-2428617273
                                                      • Opcode ID: ec81fd8aa6655a98f066f62fb13cf672102ddbea32881688e7ee18a88896282b
                                                      • Instruction ID: fda37c8db11b0e5bf26fdbe4dbdcbf79bb2b722e9c235b5a5441a72573d443d1
                                                      • Opcode Fuzzy Hash: ec81fd8aa6655a98f066f62fb13cf672102ddbea32881688e7ee18a88896282b
                                                      • Instruction Fuzzy Hash: 4AA13FB2408754ABC350EBA4D895DAFB7EDAF98300F400C2EF585C7191EB34DA49CB66
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00671B50
                                                      • _wcscmp.LIBCMT ref: 00671B65
                                                      • _wcscmp.LIBCMT ref: 00671B7C
                                                      • GetFileAttributesW.KERNEL32(?), ref: 00671B8E
                                                      • SetFileAttributesW.KERNEL32(?,?), ref: 00671BA8
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00671BC0
                                                      • FindClose.KERNEL32(00000000), ref: 00671BCB
                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00671BE7
                                                      • _wcscmp.LIBCMT ref: 00671C0E
                                                      • _wcscmp.LIBCMT ref: 00671C25
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00671C37
                                                      • SetCurrentDirectoryW.KERNEL32(006D39FC), ref: 00671C55
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00671C5F
                                                      • FindClose.KERNEL32(00000000), ref: 00671C6C
                                                      • FindClose.KERNEL32(00000000), ref: 00671C7C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                      • String ID: *.*
                                                      • API String ID: 1803514871-438819550
                                                      • Opcode ID: f386b888ee91554df3066a50dc9ed2e18009c79a11b31c9cc870326adac80c01
                                                      • Instruction ID: 4026fa59238d8eef892569abfdfaa3c79f2eaa2ca2dc51e20717e8de12dc8ed7
                                                      • Opcode Fuzzy Hash: f386b888ee91554df3066a50dc9ed2e18009c79a11b31c9cc870326adac80c01
                                                      • Instruction Fuzzy Hash: 0031D6315002196BCF15ABF4DC49ADE77AE9F07310F108157F91AE6290EB74DF858E64
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00671CAB
                                                      • _wcscmp.LIBCMT ref: 00671CC0
                                                      • _wcscmp.LIBCMT ref: 00671CD7
                                                        • Part of subcall function 00666BD4: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00666BEF
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00671D06
                                                      • FindClose.KERNEL32(00000000), ref: 00671D11
                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00671D2D
                                                      • _wcscmp.LIBCMT ref: 00671D54
                                                      • _wcscmp.LIBCMT ref: 00671D6B
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00671D7D
                                                      • SetCurrentDirectoryW.KERNEL32(006D39FC), ref: 00671D9B
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00671DA5
                                                      • FindClose.KERNEL32(00000000), ref: 00671DB2
                                                      • FindClose.KERNEL32(00000000), ref: 00671DC2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                      • String ID: *.*
                                                      • API String ID: 1824444939-438819550
                                                      • Opcode ID: 823bdfea183ac57ac335d109dde0cb926e6b4d1534beca68e6fe564470b884c3
                                                      • Instruction ID: f20f9792acfadcdca29773d16b2f512c9d39e387a968a4eacee2c8b150d86f4d
                                                      • Opcode Fuzzy Hash: 823bdfea183ac57ac335d109dde0cb926e6b4d1534beca68e6fe564470b884c3
                                                      • Instruction Fuzzy Hash: 2031F832500619AACF21AFA4DC59ADE77AF9F07320F108557F819AA290DB70DF85CE54
                                                      APIs
                                                      • GetLocalTime.KERNEL32(?), ref: 006709DF
                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 006709EF
                                                      • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 006709FB
                                                      • __wsplitpath.LIBCMT ref: 00670A59
                                                      • _wcscat.LIBCMT ref: 00670A71
                                                      • _wcscat.LIBCMT ref: 00670A83
                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00670A98
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00670AAC
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00670ADE
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00670AFF
                                                      • _wcscpy.LIBCMT ref: 00670B0B
                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00670B4A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                      • String ID: *.*
                                                      • API String ID: 3566783562-438819550
                                                      • Opcode ID: ff826960acfd6c7b48796ce00b5ebf70dec17d718078bffc3e20c9299bca6208
                                                      • Instruction ID: ac1e2b99f91ae1e3a5216c97284074c427e1bbca786d569d07b53b25829a900e
                                                      • Opcode Fuzzy Hash: ff826960acfd6c7b48796ce00b5ebf70dec17d718078bffc3e20c9299bca6208
                                                      • Instruction Fuzzy Hash: 106148B25043059FDB50EF60C84599EB3EAFF89314F04891EFA89C7251DB31EA45CBA6
                                                      APIs
                                                        • Part of subcall function 0065ABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 0065ABD7
                                                        • Part of subcall function 0065ABBB: GetLastError.KERNEL32(?,0065A69F,?,?,?), ref: 0065ABE1
                                                        • Part of subcall function 0065ABBB: GetProcessHeap.KERNEL32(00000008,?,?,0065A69F,?,?,?), ref: 0065ABF0
                                                        • Part of subcall function 0065ABBB: HeapAlloc.KERNEL32(00000000,?,0065A69F,?,?,?), ref: 0065ABF7
                                                        • Part of subcall function 0065ABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0065AC0E
                                                        • Part of subcall function 0065AC56: GetProcessHeap.KERNEL32(00000008,0065A6B5,00000000,00000000,?,0065A6B5,?), ref: 0065AC62
                                                        • Part of subcall function 0065AC56: HeapAlloc.KERNEL32(00000000,?,0065A6B5,?), ref: 0065AC69
                                                        • Part of subcall function 0065AC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,0065A6B5,?), ref: 0065AC7A
                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0065A6D0
                                                      • _memset.LIBCMT ref: 0065A6E5
                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0065A704
                                                      • GetLengthSid.ADVAPI32(?), ref: 0065A715
                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 0065A752
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 0065A76E
                                                      • GetLengthSid.ADVAPI32(?), ref: 0065A78B
                                                      • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 0065A79A
                                                      • HeapAlloc.KERNEL32(00000000), ref: 0065A7A1
                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0065A7C2
                                                      • CopySid.ADVAPI32(00000000), ref: 0065A7C9
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 0065A7FA
                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 0065A820
                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 0065A834
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                      • String ID:
                                                      • API String ID: 3996160137-0
                                                      • Opcode ID: 157e726e4b71b84ac9672d93c18efbf06b464456747cb0647d1363b2314bebdb
                                                      • Instruction ID: a8dd47ca9f527ee7d4249234fbd322da054448ce1c5f2e4787ffc293a73fb858
                                                      • Opcode Fuzzy Hash: 157e726e4b71b84ac9672d93c18efbf06b464456747cb0647d1363b2314bebdb
                                                      • Instruction Fuzzy Hash: 92514C71900209AFDF10DFA5DC44AEEBBBAFF05305F048229F911A7290DB34AA09CF61
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: l$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$lll l
                                                      • API String ID: 0-908078634
                                                      • Opcode ID: a8016ce498e1d57ddf49bec7c3b135d57be524ba8ee299c897453bf01c1e40e9
                                                      • Instruction ID: 23c75ffb557133e79f9d38fbf6f45df3ada96bcd610b0872345e517ac9a78731
                                                      • Opcode Fuzzy Hash: a8016ce498e1d57ddf49bec7c3b135d57be524ba8ee299c897453bf01c1e40e9
                                                      • Instruction Fuzzy Hash: A7727F71E0462A8BDB14DF58D890BEEB7B6BF49310F14416AE805EB380DB749E81DF94
                                                      APIs
                                                        • Part of subcall function 00666EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00665FA6,?), ref: 00666ED8
                                                        • Part of subcall function 006672CB: GetFileAttributesW.KERNEL32(?,00666019), ref: 006672CC
                                                      • _wcscat.LIBCMT ref: 00666441
                                                      • __wsplitpath.LIBCMT ref: 0066645F
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00666474
                                                      • _wcscpy.LIBCMT ref: 006664A3
                                                      • _wcscat.LIBCMT ref: 006664B8
                                                      • _wcscat.LIBCMT ref: 006664CA
                                                      • DeleteFileW.KERNEL32(?), ref: 006664DA
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 006664EB
                                                      • FindClose.KERNEL32(00000000), ref: 00666506
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: File$Find_wcscat$AttributesCloseDeleteFirstFullNameNextPath__wsplitpath_wcscpy
                                                      • String ID: \*.*
                                                      • API String ID: 2643075503-1173974218
                                                      • Opcode ID: 9a90bb0f0cf2e22086fb7f13ea6a90b4157e124a5d6415875b94d3d8d4a0bc63
                                                      • Instruction ID: b2c8ea56dc2d385374e15ad2cdf2cb15838f75f9dcb389029578262375559ff5
                                                      • Opcode Fuzzy Hash: 9a90bb0f0cf2e22086fb7f13ea6a90b4157e124a5d6415875b94d3d8d4a0bc63
                                                      • Instruction Fuzzy Hash: 5C31C5B240C384AAC721EBA4C8859DB77DDAF56304F00492EF6D9C3141EA35E50DC7A7
                                                      APIs
                                                        • Part of subcall function 00683C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00682BB5,?,?), ref: 00683C1D
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0068328E
                                                        • Part of subcall function 0062936C: __swprintf.LIBCMT ref: 006293AB
                                                        • Part of subcall function 0062936C: __itow.LIBCMT ref: 006293DF
                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0068332D
                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 006833C5
                                                      • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00683604
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00683611
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                      • String ID:
                                                      • API String ID: 1240663315-0
                                                      • Opcode ID: 2aaf190c64948e401840f1281432a729a633808dfc7797c7ba92c89b594cd81a
                                                      • Instruction ID: bc4aac70c67fe4b172818acf137f25a3d32832639fb0ce86c7712a22af29a29d
                                                      • Opcode Fuzzy Hash: 2aaf190c64948e401840f1281432a729a633808dfc7797c7ba92c89b594cd81a
                                                      • Instruction Fuzzy Hash: B2E15C31604220AFCB14EF28C991D6ABBE6EF89714F04855DF44AD7361DB30EA05CF56
                                                      APIs
                                                      • GetKeyboardState.USER32(?), ref: 00662B5F
                                                      • GetAsyncKeyState.USER32(000000A0), ref: 00662BE0
                                                      • GetKeyState.USER32(000000A0), ref: 00662BFB
                                                      • GetAsyncKeyState.USER32(000000A1), ref: 00662C15
                                                      • GetKeyState.USER32(000000A1), ref: 00662C2A
                                                      • GetAsyncKeyState.USER32(00000011), ref: 00662C42
                                                      • GetKeyState.USER32(00000011), ref: 00662C54
                                                      • GetAsyncKeyState.USER32(00000012), ref: 00662C6C
                                                      • GetKeyState.USER32(00000012), ref: 00662C7E
                                                      • GetAsyncKeyState.USER32(0000005B), ref: 00662C96
                                                      • GetKeyState.USER32(0000005B), ref: 00662CA8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: State$Async$Keyboard
                                                      • String ID:
                                                      • API String ID: 541375521-0
                                                      • Opcode ID: 4bbc6f5d5174a916e99b00e899327f27a8ba2f1ec61623ad49e9e8a254bd1387
                                                      • Instruction ID: 7d22fa9c3814139b409981ab5298dc2aa277a7490b7e6c4ee8ed52af532220f5
                                                      • Opcode Fuzzy Hash: 4bbc6f5d5174a916e99b00e899327f27a8ba2f1ec61623ad49e9e8a254bd1387
                                                      • Instruction Fuzzy Hash: 7D41E734904FCB6DFF749B6088643F9BEA2AF22348F048059D9C6567C1DB9499C4C7A2
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                      • String ID:
                                                      • API String ID: 1737998785-0
                                                      • Opcode ID: 3079903ffe4ae509496b10f1b8b0fd068240483606792826c2bfd739033b0a8f
                                                      • Instruction ID: b94f527123de288441fe7ba0476ae3ae6ba2ca9461c8b12035fbae890d3faeb7
                                                      • Opcode Fuzzy Hash: 3079903ffe4ae509496b10f1b8b0fd068240483606792826c2bfd739033b0a8f
                                                      • Instruction Fuzzy Hash: 13218931300610AFDB11AF64DC59B6DB7AAEF45720F04A01AF94A9B2A1DB30F9018F98
                                                      APIs
                                                        • Part of subcall function 00659ABF: CLSIDFromProgID.OLE32 ref: 00659ADC
                                                        • Part of subcall function 00659ABF: ProgIDFromCLSID.OLE32(?,00000000), ref: 00659AF7
                                                        • Part of subcall function 00659ABF: lstrcmpiW.KERNEL32(?,00000000), ref: 00659B05
                                                        • Part of subcall function 00659ABF: CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00659B15
                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 0067C235
                                                      • _memset.LIBCMT ref: 0067C242
                                                      • _memset.LIBCMT ref: 0067C360
                                                      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000001), ref: 0067C38C
                                                      • CoTaskMemFree.OLE32(?), ref: 0067C397
                                                      Strings
                                                      • NULL Pointer assignment, xrefs: 0067C3E5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                      • String ID: NULL Pointer assignment
                                                      • API String ID: 1300414916-2785691316
                                                      • Opcode ID: 3511af34a86c34dc3be1078c5e7ec31ef6477c79e385f3ce4012d48f915a3346
                                                      • Instruction ID: 7ae01fec3c8716ca4b77439d79dede84c7e788693256da2f411cffb0141c074e
                                                      • Opcode Fuzzy Hash: 3511af34a86c34dc3be1078c5e7ec31ef6477c79e385f3ce4012d48f915a3346
                                                      • Instruction Fuzzy Hash: C6912C71D00228ABDB10DF94DC95EDEBBBAEF04720F10815EF919A7291DB709A45CFA4
                                                      APIs
                                                        • Part of subcall function 0065B134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0065B180
                                                        • Part of subcall function 0065B134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0065B1AD
                                                        • Part of subcall function 0065B134: GetLastError.KERNEL32 ref: 0065B1BA
                                                      • ExitWindowsEx.USER32(?,00000000), ref: 00667A0F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                      • String ID: $@$SeShutdownPrivilege
                                                      • API String ID: 2234035333-194228
                                                      • Opcode ID: 7955584c9d9998ca64f104c4f794b05c98bb5c0d92942e3c9b2cc6414808949a
                                                      • Instruction ID: b4be15fbb3a3ddbb11f2781d223a7e97a0d779859f6a26b023a20ccbbcc41d66
                                                      • Opcode Fuzzy Hash: 7955584c9d9998ca64f104c4f794b05c98bb5c0d92942e3c9b2cc6414808949a
                                                      • Instruction Fuzzy Hash: AF012B716582226AF72827F4CC4BBFF325B9B00358F241528FD13E22C2DA615F0195B4
                                                      APIs
                                                      • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00678CA8
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00678CB7
                                                      • bind.WSOCK32(00000000,?,00000010), ref: 00678CD3
                                                      • listen.WSOCK32(00000000,00000005), ref: 00678CE2
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00678CFC
                                                      • closesocket.WSOCK32(00000000,00000000), ref: 00678D10
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$bindclosesocketlistensocket
                                                      • String ID:
                                                      • API String ID: 1279440585-0
                                                      • Opcode ID: 6e9a7ee6c80b9d2cf5e6a3112263d0381bab5d7e97c5b10bdd21ea3a98654d9b
                                                      • Instruction ID: 301253ece41b6a10d5550ce4fee43251cb08c24c510d13fdd4081618cc947bbb
                                                      • Opcode Fuzzy Hash: 6e9a7ee6c80b9d2cf5e6a3112263d0381bab5d7e97c5b10bdd21ea3a98654d9b
                                                      • Instruction Fuzzy Hash: 9A21CE316006119FCB14EF68D949A6EB7AAAF49320F149158E95BA73D2CB30AD018F65
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00666554
                                                      • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00666564
                                                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 00666583
                                                      • __wsplitpath.LIBCMT ref: 006665A7
                                                      • _wcscat.LIBCMT ref: 006665BA
                                                      • CloseHandle.KERNEL32(00000000,?,00000000), ref: 006665F9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath_wcscat
                                                      • String ID:
                                                      • API String ID: 1605983538-0
                                                      • Opcode ID: 963f03b8ecf3a593010765469e6dead26edbd85a54215b2770e233c97200dc35
                                                      • Instruction ID: be33b94469c5b6b5862f5394844d1418be3020ae9d11f5c310460df8461264bb
                                                      • Opcode Fuzzy Hash: 963f03b8ecf3a593010765469e6dead26edbd85a54215b2770e233c97200dc35
                                                      • Instruction Fuzzy Hash: A8218771900218ABDB10ABA4DC89FEDB7BEAB45300F5004A9F506D7241DB71AF85CF61
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ERCP$VUUU$VUUU$VUUU$VUUU$l
                                                      • API String ID: 0-3688285930
                                                      • Opcode ID: 6e34e2993d07d64a5e7afd3d61454d0c3ff6dc9c40dbf0b8e234b1f21e7e6a25
                                                      • Instruction ID: 8a5cd5d1eb6f65cd32afd2ea128d6f418451499c39b404999c31e6009db1c390
                                                      • Opcode Fuzzy Hash: 6e34e2993d07d64a5e7afd3d61454d0c3ff6dc9c40dbf0b8e234b1f21e7e6a25
                                                      • Instruction Fuzzy Hash: A7929B71A0062ACBDF24DF98D8407EDB7B3BB95314F14819AE816AB381D7719E81CF91
                                                      APIs
                                                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 006613DC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: lstrlen
                                                      • String ID: ($,2m$<2m$|
                                                      • API String ID: 1659193697-314102281
                                                      • Opcode ID: 1ae85254a74b87ce24020f3967ccf7c30205ecbdc2c3e31a71cd4fc5911afacd
                                                      • Instruction ID: 8c6165a07437d9c67f4189b47fd10ab158f1f5143121c3b6c231630925b39114
                                                      • Opcode Fuzzy Hash: 1ae85254a74b87ce24020f3967ccf7c30205ecbdc2c3e31a71cd4fc5911afacd
                                                      • Instruction Fuzzy Hash: 60321475A007059FC728CF69C4809AAB7F1FF49320B15C56EE59ADB3A2EB70E941CB44
                                                      APIs
                                                        • Part of subcall function 0067A82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 0067A84E
                                                      • socket.WSOCK32(00000002,00000002,00000011,?,?,?,00000000), ref: 00679296
                                                      • WSAGetLastError.WSOCK32(00000000,00000000), ref: 006792B9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastinet_addrsocket
                                                      • String ID:
                                                      • API String ID: 4170576061-0
                                                      • Opcode ID: 55889b9b52fdbe4741a8cf62f18b18ae8783d7ad9f773eff7fb6aa0368179c27
                                                      • Instruction ID: cdd0a2137a2732e03b783b5867c579c3cb57b09c368cf73a97f9a45063d3adca
                                                      • Opcode Fuzzy Hash: 55889b9b52fdbe4741a8cf62f18b18ae8783d7ad9f773eff7fb6aa0368179c27
                                                      • Instruction Fuzzy Hash: F241C270600610AFDB54BB68C852E7E77EEEF45724F04844CF956AB3D2CA749D018BA5
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 0066EB8A
                                                      • _wcscmp.LIBCMT ref: 0066EBBA
                                                      • _wcscmp.LIBCMT ref: 0066EBCF
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 0066EBE0
                                                      • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0066EC0E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Find$File_wcscmp$CloseFirstNext
                                                      • String ID:
                                                      • API String ID: 2387731787-0
                                                      • Opcode ID: c15e03d4d2c5028f2c4bc175abaec186fd0b19018db56f122d5bfa8f584f255e
                                                      • Instruction ID: 23876adce3b941405c1ae15b49260310d8b0461a947b793b4152ba9d4980af6d
                                                      • Opcode Fuzzy Hash: c15e03d4d2c5028f2c4bc175abaec186fd0b19018db56f122d5bfa8f584f255e
                                                      • Instruction Fuzzy Hash: 0441AF796007028FCB08DF68C491A99B3E6FF49324F10455EE96A8B3A1DB32B945CF95
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                      • String ID:
                                                      • API String ID: 292994002-0
                                                      • Opcode ID: 5c862785e7ee65294edf5c844c440505d59cad611f044bc4b65b307c5d6e9c12
                                                      • Instruction ID: eb9afad4764c549ff41c7cba1ceab14a4186b74d753e6b22a8f87b818e47d93d
                                                      • Opcode Fuzzy Hash: 5c862785e7ee65294edf5c844c440505d59cad611f044bc4b65b307c5d6e9c12
                                                      • Instruction Fuzzy Hash: 73116D317006126FE7217F26DC48AAFBB9BEF55760F445529F88AD7241CF34A9028BA4
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,0063E014,75920AE0,0063DEF1,006BDC38,?,?), ref: 0063E02C
                                                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 0063E03E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: GetNativeSystemInfo$kernel32.dll
                                                      • API String ID: 2574300362-192647395
                                                      • Opcode ID: b8e58b045497f450584aec1c25051c03856bfe2c53133d6c41775faf7dc74099
                                                      • Instruction ID: cea86d0d64b6909bd271953a69a6327da7af5bd96714f67662be6e8abe26ff30
                                                      • Opcode Fuzzy Hash: b8e58b045497f450584aec1c25051c03856bfe2c53133d6c41775faf7dc74099
                                                      • Instruction Fuzzy Hash: 35D0A7708007139FC7355F61EC0865277D7AF21300F19441BE482D2790DBB4DC808EA0
                                                      APIs
                                                        • Part of subcall function 0063B34E: GetWindowLongW.USER32(?,000000EB), ref: 0063B35F
                                                      • DefDlgProcW.USER32(?,?,?,?,?), ref: 0063B22F
                                                        • Part of subcall function 0063B55D: DefDlgProcW.USER32(?,00000020,?,00000000), ref: 0063B5A5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Proc$LongWindow
                                                      • String ID:
                                                      • API String ID: 2749884682-0
                                                      • Opcode ID: 82f8ec74bbf5eddd649fd39bdc7d3d7f8547a50ff93a333e0a835a29282bc2b3
                                                      • Instruction ID: 72348f72f82247f34ab80308d5a86a5d30aecfdfc4db33aa309cb5cfa87cf40e
                                                      • Opcode Fuzzy Hash: 82f8ec74bbf5eddd649fd39bdc7d3d7f8547a50ff93a333e0a835a29282bc2b3
                                                      • Instruction Fuzzy Hash: CBA16E70514105BAEF28AF294C88DFF295FEB46740F14531DF602D6A91DB269E02E3F6
                                                      APIs
                                                      • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,006743BF,00000000), ref: 00674FA6
                                                      • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00674FD2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Internet$AvailableDataFileQueryRead
                                                      • String ID:
                                                      • API String ID: 599397726-0
                                                      • Opcode ID: 3f52d0c513112c6813d536395c67858a59c47e674a64b0deb0be52371c775754
                                                      • Instruction ID: 326bf37e5884c9fdc56e152f0ed74f457cca945eeb9e439ccf51829e9d95db30
                                                      • Opcode Fuzzy Hash: 3f52d0c513112c6813d536395c67858a59c47e674a64b0deb0be52371c775754
                                                      • Instruction Fuzzy Hash: 2A41D871504209BFEB10DE94CC85EFF77BEEB80764F10806EF60AA6241EBB59E41D694
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID: \Qm
                                                      • API String ID: 4104443479-172261174
                                                      • Opcode ID: 547d2714178258f336c0bd9d3aff238bd231589e63a4aa93254f011fc9ad791e
                                                      • Instruction ID: 049eb78736858273de7bb02dded6b9bcfee74889dbfb3e26f7ef394cd58d8900
                                                      • Opcode Fuzzy Hash: 547d2714178258f336c0bd9d3aff238bd231589e63a4aa93254f011fc9ad791e
                                                      • Instruction Fuzzy Hash: CDA24C70E04629CFDB24CF58D880AEDB7B2BF59314F2581A9D859AB390D7349E82DF50
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 0066E20D
                                                      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0066E267
                                                      • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0066E2B4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$DiskFreeSpace
                                                      • String ID:
                                                      • API String ID: 1682464887-0
                                                      • Opcode ID: 99111389826e7ca3f64d6e44724be569652d50650181a2c2dfb2ca0f1c3ed36f
                                                      • Instruction ID: 921605801c6078027deaf68cd860c682707e5f570f16ba20fc23aa966a98abc5
                                                      • Opcode Fuzzy Hash: 99111389826e7ca3f64d6e44724be569652d50650181a2c2dfb2ca0f1c3ed36f
                                                      • Instruction Fuzzy Hash: 78216075A00618EFCB00EFA5D894AEDBBBAFF49310F0484A9E905A7351DB31A905CF54
                                                      APIs
                                                        • Part of subcall function 0063F4EA: std::exception::exception.LIBCMT ref: 0063F51E
                                                        • Part of subcall function 0063F4EA: __CxxThrowException@8.LIBCMT ref: 0063F533
                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0065B180
                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0065B1AD
                                                      • GetLastError.KERNEL32 ref: 0065B1BA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                      • String ID:
                                                      • API String ID: 1922334811-0
                                                      • Opcode ID: ed913ab3c0ad62e6e078992ec149f5711a05ee49e683996d42ed71a01d51b1ab
                                                      • Instruction ID: a6ddb06e895f89d4cd8065252a1b596652a45271df8f9d61551f74bb2d02ff74
                                                      • Opcode Fuzzy Hash: ed913ab3c0ad62e6e078992ec149f5711a05ee49e683996d42ed71a01d51b1ab
                                                      • Instruction Fuzzy Hash: 4711BCB2800604AFE728AF64DC85D6BB7AEEB44311F20852EE45697241DB70FC458BA0
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00666623
                                                      • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00666664
                                                      • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0066666F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CloseControlCreateDeviceFileHandle
                                                      • String ID:
                                                      • API String ID: 33631002-0
                                                      • Opcode ID: 2363f2a8dfbab8a9d65b3aca59e6c4a00c56212f15901ecb813d2978b52fc90d
                                                      • Instruction ID: 22c94590567cf001855f5d010c2c748974d1fdaf985623bc6d07e989a20302df
                                                      • Opcode Fuzzy Hash: 2363f2a8dfbab8a9d65b3aca59e6c4a00c56212f15901ecb813d2978b52fc90d
                                                      • Instruction Fuzzy Hash: AE115E71E01228BFDB109FA4EC44BAEBBBDEB45B10F104156F900F6290D3B06E018BA1
                                                      APIs
                                                      • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00667223
                                                      • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0066723A
                                                      • FreeSid.ADVAPI32(?), ref: 0066724A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: AllocateCheckFreeInitializeMembershipToken
                                                      • String ID:
                                                      • API String ID: 3429775523-0
                                                      • Opcode ID: fe0a00d0c0de7abedfb2bed9af6b18a39fdcb64d6d857427dff0766f0ec4db84
                                                      • Instruction ID: 9960f676c4abed2db6f1cf3120d4bbaedce5ab05e77121f15b5a039ea45203ba
                                                      • Opcode Fuzzy Hash: fe0a00d0c0de7abedfb2bed9af6b18a39fdcb64d6d857427dff0766f0ec4db84
                                                      • Instruction Fuzzy Hash: D4F01D76A04209BFDF04DFF4DD99AEEBBBDFF09205F105469A602E2591E370AA448B10
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 0066F599
                                                      • FindClose.KERNEL32(00000000), ref: 0066F5C9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFileFirst
                                                      • String ID:
                                                      • API String ID: 2295610775-0
                                                      • Opcode ID: 8cb0b5fbbcc36b3e8c88ad31a642f63cd50cf880a47b41f8ad24a7cc794dfd83
                                                      • Instruction ID: b77fa68e950be6c179f08593002d5309caffeff3cabf292313b674536233adc4
                                                      • Opcode Fuzzy Hash: 8cb0b5fbbcc36b3e8c88ad31a642f63cd50cf880a47b41f8ad24a7cc794dfd83
                                                      • Instruction Fuzzy Hash: 381161716046019FDB10EF28D845A2EB7EAFF99324F00891EF8A6D7291DB30AD058B95
                                                      APIs
                                                      • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,0067BE6A,?,?,00000000,?), ref: 0066CEA7
                                                      • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,0067BE6A,?,?,00000000,?), ref: 0066CEB9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ErrorFormatLastMessage
                                                      • String ID:
                                                      • API String ID: 3479602957-0
                                                      • Opcode ID: 461902a6242b5930500345b602fd336c9abaa4c1fb247c1af5c16fbba516347e
                                                      • Instruction ID: 3e990db0d9d4c302d1aad6f7c987a465fc8dde27d34f7b092d5d4651ea2ba180
                                                      • Opcode Fuzzy Hash: 461902a6242b5930500345b602fd336c9abaa4c1fb247c1af5c16fbba516347e
                                                      • Instruction Fuzzy Hash: 2EF08231500329BBDB10ABA4DC49FFA777EBF09361F004165F955D6181D670AA40CFA0
                                                      APIs
                                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00664153
                                                      • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 00664166
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: InputSendkeybd_event
                                                      • String ID:
                                                      • API String ID: 3536248340-0
                                                      • Opcode ID: 728d6c75df76800295fbe397186693f34aeec905b10b739f67926171d2d7e567
                                                      • Instruction ID: 857113c21731c2214032ce664ab00d597735a8dca1ceedd5f52f019ae22ecbdc
                                                      • Opcode Fuzzy Hash: 728d6c75df76800295fbe397186693f34aeec905b10b739f67926171d2d7e567
                                                      • Instruction Fuzzy Hash: 62F0677080024DAFDB059FA0C805BBEBBB1EF01305F00800AF966A6292D7799612DFA0
                                                      APIs
                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,0065ACC0), ref: 0065AB99
                                                      • CloseHandle.KERNEL32(?,?,0065ACC0), ref: 0065ABAB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: AdjustCloseHandlePrivilegesToken
                                                      • String ID:
                                                      • API String ID: 81990902-0
                                                      • Opcode ID: 7d57c7a4aa10c30267b78510fd1ce37764aa40dc3bb5e7b73bfe97345d96bbb5
                                                      • Instruction ID: 3a2c8a9380b95b447654a191531a8ceec377d38674e52fc87c7c53e4bc0b7c99
                                                      • Opcode Fuzzy Hash: 7d57c7a4aa10c30267b78510fd1ce37764aa40dc3bb5e7b73bfe97345d96bbb5
                                                      • Instruction Fuzzy Hash: 0FE0E675400510AFE7652F54EC05DB7BBEBEF05321F10852DF85B81870D7626C90DB94
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,0000000E,00646DB3,-0000031A,?,?,00000001), ref: 006481B1
                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 006481BA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: e7b712d3f524be9bbd1d9998fd78565a13bbf595dd1c4abd799f1c7fd14408e4
                                                      • Instruction ID: f80289f798d342a6a1e93043f2c583973289f5a172519efecd1dfbab86b0d9cd
                                                      • Opcode Fuzzy Hash: e7b712d3f524be9bbd1d9998fd78565a13bbf595dd1c4abd799f1c7fd14408e4
                                                      • Instruction Fuzzy Hash: E5B09231044608FBDF003BA1EC09B587F6AEB0B652F005010F60E848618B7264108F92
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 36a4d818598fd310a2e0b10631e53d7860a71f17329989567711a11fada8c3ee
                                                      • Instruction ID: 2cb7f1dad1ab8753be05632085ebb6ba63ea75108a0aead342bcc1c116e28a93
                                                      • Opcode Fuzzy Hash: 36a4d818598fd310a2e0b10631e53d7860a71f17329989567711a11fada8c3ee
                                                      • Instruction Fuzzy Hash: A0320461D29F014DD7239634D872336A28AAFB73D4F15E737E81AB5AA6EB29C4C34100
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: __itow__swprintf
                                                      • String ID:
                                                      • API String ID: 674341424-0
                                                      • Opcode ID: 93419c56fadc6601ff25a595fec1b876423f2bc63cd240f10e35aa1a0e066ebb
                                                      • Instruction ID: b5acf4f97330fb645ef09183d5cf4def16013217000f19d2bbf05d6c126bae28
                                                      • Opcode Fuzzy Hash: 93419c56fadc6601ff25a595fec1b876423f2bc63cd240f10e35aa1a0e066ebb
                                                      • Instruction Fuzzy Hash: 7322BA715087119FDB24DF24D890BAFB7EAAF84310F10491DF89A8B291DB31E945CFA6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 997b27585f924c7b41cb0eb7433dbbb17a7050c9584562c8844ec5497c5f2991
                                                      • Instruction ID: 776b4b24e3902e89816fc94d30640f49f069424921c94f31b27d6f3d6d58cbf4
                                                      • Opcode Fuzzy Hash: 997b27585f924c7b41cb0eb7433dbbb17a7050c9584562c8844ec5497c5f2991
                                                      • Instruction Fuzzy Hash: 99B1AC60D2AF414DD763A6398831336B65DAFBB2D5B91E71BFC2B74D22EB2185C34180
                                                      APIs
                                                      • __time64.LIBCMT ref: 0066B6DF
                                                        • Part of subcall function 0064344A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,0066BDC3,00000000,?,?,?,?,0066BF70,00000000,?), ref: 00643453
                                                        • Part of subcall function 0064344A: __aulldiv.LIBCMT ref: 00643473
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Time$FileSystem__aulldiv__time64
                                                      • String ID:
                                                      • API String ID: 2893107130-0
                                                      • Opcode ID: 1acf6a8bd2518ffa53fa0ceeddc6ba9ba0b907be01f37270db0d3323c43aa88a
                                                      • Instruction ID: 8ed16cb65e658dc144e6b73e5c7f85ecaf839c6c872868a520afede1de862081
                                                      • Opcode Fuzzy Hash: 1acf6a8bd2518ffa53fa0ceeddc6ba9ba0b907be01f37270db0d3323c43aa88a
                                                      • Instruction Fuzzy Hash: CF217272634650CBC729CF28C881A92B7E2EB95310B249E6DE4E5CF2C0CB74BA45DB54
                                                      APIs
                                                      • BlockInput.USER32(00000001), ref: 00676ACA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: BlockInput
                                                      • String ID:
                                                      • API String ID: 3456056419-0
                                                      • Opcode ID: ea2ca54ae963377c6ef3edf4daa312015c8f91794c2f8b01e8d0e20759a7dcda
                                                      • Instruction ID: a0589f71a7cdb465dfba5eaefa8291dedd6382a7fd472f9e8bf229740e66a94d
                                                      • Opcode Fuzzy Hash: ea2ca54ae963377c6ef3edf4daa312015c8f91794c2f8b01e8d0e20759a7dcda
                                                      • Instruction Fuzzy Hash: E5E04835200214AFC740EF59D404D96B7EEAF74751F04D41AF94AD7351DAB0F8048BA0
                                                      APIs
                                                      • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 0066750A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: mouse_event
                                                      • String ID:
                                                      • API String ID: 2434400541-0
                                                      • Opcode ID: d2cc7c702b162d0202d69db8c19c591b7d9801744417d7f7176f4660e5891560
                                                      • Instruction ID: 997bab1a592673c9abb0b3576d8212bed37ab9d04dc1c874d278d974b31cd8ac
                                                      • Opcode Fuzzy Hash: d2cc7c702b162d0202d69db8c19c591b7d9801744417d7f7176f4660e5891560
                                                      • Instruction Fuzzy Hash: DDD052A013C20438EC2987208C1FFFB0A8BF38078CFD4428AB203D92C0ECE86D02A070
                                                      APIs
                                                      • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,0065AD3E), ref: 0065B124
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: LogonUser
                                                      • String ID:
                                                      • API String ID: 1244722697-0
                                                      • Opcode ID: c046b29492ad5e12840e0d4362c67e0cee9987e223fa2b6e9cec773a1b999de8
                                                      • Instruction ID: 78dea7ed55ddd76531312b62c726cf5ae2ab6694a899fd0f3ede3dd2cf60c1ab
                                                      • Opcode Fuzzy Hash: c046b29492ad5e12840e0d4362c67e0cee9987e223fa2b6e9cec773a1b999de8
                                                      • Instruction Fuzzy Hash: 75D05E320A460EAEDF025FA4DC02EAE3F6AEB04700F408110FA12C50A0C671D531AF50
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: NameUser
                                                      • String ID:
                                                      • API String ID: 2645101109-0
                                                      • Opcode ID: c79c4616a5c1e5d21b7feb2fe9ebf3dfdaf3922fae088235dd33e596bce483a1
                                                      • Instruction ID: 41ff425b21b6369c008edcdc4be9d9280d82480c2046d4f90a06e559967991a1
                                                      • Opcode Fuzzy Hash: c79c4616a5c1e5d21b7feb2fe9ebf3dfdaf3922fae088235dd33e596bce483a1
                                                      • Instruction Fuzzy Hash: 8BC04CB1400109DFCB51DFC0C9449EEB7BDAB04305F105091A106F1510D7709B859F72
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0064818F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: de3792e979e69e9abad864af99ca9a672951abc99c49898bd8f8ed7b297300f6
                                                      • Instruction ID: 7b061154f7443066ae4280db9de1e01bdb94eb552f6ed9cba916a27dec5fb24a
                                                      • Opcode Fuzzy Hash: de3792e979e69e9abad864af99ca9a672951abc99c49898bd8f8ed7b297300f6
                                                      • Instruction Fuzzy Hash: C0A0113000020CAB8F002B82EC088883F2EEA022A0B000020F80E808208B22A8208A82
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5c71374b5180bab9454c3a92a7edd50843f76784fade180d2efaee88dda2e77e
                                                      • Instruction ID: d31467614d4bc996b4f12c5090796233de1c1e9c499c87c7939e220e7d4d9e7f
                                                      • Opcode Fuzzy Hash: 5c71374b5180bab9454c3a92a7edd50843f76784fade180d2efaee88dda2e77e
                                                      • Instruction Fuzzy Hash: C922AF74900625CFDB24DF54D490AEAB7F2FF14314F248079E98AAB351E736A981CF91
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 170a017daf1a57d3eda490fddc664ddf0c808606fe6b18d485dd1eea8efabfab
                                                      • Instruction ID: 1311ff02d6f78d93548924fa9c769519e74c0ce4e2a75ccf2f87b55a75d3af6f
                                                      • Opcode Fuzzy Hash: 170a017daf1a57d3eda490fddc664ddf0c808606fe6b18d485dd1eea8efabfab
                                                      • Instruction Fuzzy Hash: BE12A170A00619EFDF04DFA5E991AEEB7F6FF48300F104529E806E7650EB36A911CB64
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Exception@8Throwstd::exception::exception
                                                      • String ID:
                                                      • API String ID: 3728558374-0
                                                      • Opcode ID: 142a0af323fd57216107bbb1ba275a9c046245f243b9be7c35f39c036237319c
                                                      • Instruction ID: 4a15937ba4b706f12ba292409aeac69642a8cfdc03e0993f4eef5f21b43fb30b
                                                      • Opcode Fuzzy Hash: 142a0af323fd57216107bbb1ba275a9c046245f243b9be7c35f39c036237319c
                                                      • Instruction Fuzzy Hash: D302B270E00216EBCF54DF68D991AAEB7FAFF44300F148069E806DB295EB31DA15CB95
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                      • Instruction ID: 899a9f98c086ad0edaac6e5a3bce95df8f54784e6d71f04e75a239c789a874b3
                                                      • Opcode Fuzzy Hash: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                      • Instruction Fuzzy Hash: 6DC1A8322051A34AEF2D473984344BEFAA25F917B1B1A176DE9B3CB6D5EF30C524D620
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                      • Instruction ID: d65016f326e5eacdb1c6077af731ea87a0c404bee229a2c17fa230f16343e128
                                                      • Opcode Fuzzy Hash: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                      • Instruction Fuzzy Hash: 47C1C6322051A309EF2D4739C4344BEBAA25FA27B171A176DE5B3CB6D5EF30C524D620
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                      • Instruction ID: 541f8a0fff997c132c515462313e55b18cacb7e7607250483b6498fd1c07e741
                                                      • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                      • Instruction Fuzzy Hash: 43C17F3260509309DF2D473984744BEBAA25FA2BB1F1A177DE4B3CB6D5EE20C524D660
                                                      APIs
                                                      • DeleteObject.GDI32(00000000), ref: 0067A2FE
                                                      • DeleteObject.GDI32(00000000), ref: 0067A310
                                                      • DestroyWindow.USER32 ref: 0067A31E
                                                      • GetDesktopWindow.USER32 ref: 0067A338
                                                      • GetWindowRect.USER32(00000000), ref: 0067A33F
                                                      • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0067A480
                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 0067A490
                                                      • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0067A4D8
                                                      • GetClientRect.USER32(00000000,?), ref: 0067A4E4
                                                      • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 0067A51E
                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0067A540
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0067A553
                                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0067A55E
                                                      • GlobalLock.KERNEL32(00000000), ref: 0067A567
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0067A576
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0067A57F
                                                      • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0067A586
                                                      • GlobalFree.KERNEL32(00000000), ref: 0067A591
                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0067A5A3
                                                      • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,006AD9BC,00000000), ref: 0067A5B9
                                                      • GlobalFree.KERNEL32(00000000), ref: 0067A5C9
                                                      • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 0067A5EF
                                                      • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 0067A60E
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0067A630
                                                      • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0067A81D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                      • String ID: $AutoIt v3$DISPLAY$static
                                                      • API String ID: 2211948467-2373415609
                                                      • Opcode ID: e30e5fae1c8f6ac9800e8a69f72f6d9de4c089259617564c0d1fe4bd34ed72ce
                                                      • Instruction ID: 57184bb8f27f242fb6b2a1829bf70d7073fa871c48fa39c62002538a926dab6c
                                                      • Opcode Fuzzy Hash: e30e5fae1c8f6ac9800e8a69f72f6d9de4c089259617564c0d1fe4bd34ed72ce
                                                      • Instruction Fuzzy Hash: 2B025F75900254EFDB14DFA4DD89EAE7BBAFB49310F008158F91AAB2A0D770AD41CF61
                                                      APIs
                                                      • SetTextColor.GDI32(?,00000000), ref: 0068D2DB
                                                      • GetSysColorBrush.USER32(0000000F), ref: 0068D30C
                                                      • GetSysColor.USER32(0000000F), ref: 0068D318
                                                      • SetBkColor.GDI32(?,000000FF), ref: 0068D332
                                                      • SelectObject.GDI32(?,00000000), ref: 0068D341
                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 0068D36C
                                                      • GetSysColor.USER32(00000010), ref: 0068D374
                                                      • CreateSolidBrush.GDI32(00000000), ref: 0068D37B
                                                      • FrameRect.USER32(?,?,00000000), ref: 0068D38A
                                                      • DeleteObject.GDI32(00000000), ref: 0068D391
                                                      • InflateRect.USER32(?,000000FE,000000FE), ref: 0068D3DC
                                                      • FillRect.USER32(?,?,00000000), ref: 0068D40E
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 0068D439
                                                        • Part of subcall function 0068D575: GetSysColor.USER32(00000012), ref: 0068D5AE
                                                        • Part of subcall function 0068D575: SetTextColor.GDI32(?,?), ref: 0068D5B2
                                                        • Part of subcall function 0068D575: GetSysColorBrush.USER32(0000000F), ref: 0068D5C8
                                                        • Part of subcall function 0068D575: GetSysColor.USER32(0000000F), ref: 0068D5D3
                                                        • Part of subcall function 0068D575: GetSysColor.USER32(00000011), ref: 0068D5F0
                                                        • Part of subcall function 0068D575: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0068D5FE
                                                        • Part of subcall function 0068D575: SelectObject.GDI32(?,00000000), ref: 0068D60F
                                                        • Part of subcall function 0068D575: SetBkColor.GDI32(?,00000000), ref: 0068D618
                                                        • Part of subcall function 0068D575: SelectObject.GDI32(?,?), ref: 0068D625
                                                        • Part of subcall function 0068D575: InflateRect.USER32(?,000000FF,000000FF), ref: 0068D644
                                                        • Part of subcall function 0068D575: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0068D65B
                                                        • Part of subcall function 0068D575: GetWindowLongW.USER32(00000000,000000F0), ref: 0068D670
                                                        • Part of subcall function 0068D575: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0068D698
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                      • String ID:
                                                      • API String ID: 3521893082-0
                                                      • Opcode ID: 683558220bc32cb4785ec5a137948a1ba864462e65952064bfeaccaf4c41f544
                                                      • Instruction ID: 35041fd33aa8fc055a137ed8e829db8350a6a0d0d748799c4a3531918b16139c
                                                      • Opcode Fuzzy Hash: 683558220bc32cb4785ec5a137948a1ba864462e65952064bfeaccaf4c41f544
                                                      • Instruction Fuzzy Hash: 66917F71408301BFC710AF64DC48EABBBAAFB8A325F101B19F562965E0D771E945CF62
                                                      APIs
                                                      • DestroyWindow.USER32 ref: 0063B98B
                                                      • DeleteObject.GDI32(00000000), ref: 0063B9CD
                                                      • DeleteObject.GDI32(00000000), ref: 0063B9D8
                                                      • DestroyIcon.USER32(00000000), ref: 0063B9E3
                                                      • DestroyWindow.USER32(00000000), ref: 0063B9EE
                                                      • SendMessageW.USER32(?,00001308,?,00000000), ref: 0069D2AA
                                                      • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0069D2E3
                                                      • MoveWindow.USER32(00000000,?,?,?,?,00000000), ref: 0069D711
                                                        • Part of subcall function 0063B9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,0063B759,?,00000000,?,?,?,?,0063B72B,00000000,?), ref: 0063BA58
                                                      • SendMessageW.USER32 ref: 0069D758
                                                      • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0069D76F
                                                      • ImageList_Destroy.COMCTL32(00000000), ref: 0069D785
                                                      • ImageList_Destroy.COMCTL32(00000000), ref: 0069D790
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                      • String ID: 0
                                                      • API String ID: 464785882-4108050209
                                                      • Opcode ID: d020694221eaa5fa2ce02a737413c79382fa7e4eef3a03ef8cc4e7606b816833
                                                      • Instruction ID: c04559b1b89b4020d2037f87db19cff4bba7854a3289cb6728d112d0718385d9
                                                      • Opcode Fuzzy Hash: d020694221eaa5fa2ce02a737413c79382fa7e4eef3a03ef8cc4e7606b816833
                                                      • Instruction Fuzzy Hash: A8127E34604201DFDB15DF28C884BA9B7EAFF46304F145579EA89CBAA2C731EC46CB91
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 0066DBD6
                                                      • GetDriveTypeW.KERNEL32(?,006BDC54,?,\\.\,006BDC00), ref: 0066DCC3
                                                      • SetErrorMode.KERNEL32(00000000,006BDC54,?,\\.\,006BDC00), ref: 0066DE29
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$DriveType
                                                      • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                      • API String ID: 2907320926-4222207086
                                                      • Opcode ID: 78fb222641a0601f13be921227f8ba4b958d3101d99d7f51de0acf61ffa2c843
                                                      • Instruction ID: 8d00e1686cafd3f37f158a5c645c493da4a7d61f6c63951a3c4b38945edae8db
                                                      • Opcode Fuzzy Hash: 78fb222641a0601f13be921227f8ba4b958d3101d99d7f51de0acf61ffa2c843
                                                      • Instruction Fuzzy Hash: 19518D30F48712ABC210EF14D982C69B7A3FFA4744B21482FF4479B391DA71D946DB86
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: __wcsnicmp
                                                      • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                      • API String ID: 1038674560-86951937
                                                      • Opcode ID: 7a2ddcbd52f069b3f49569ce8fda4e99ad5a39eb4389677454f43891b999d28c
                                                      • Instruction ID: 447ea7192540180a807133e292d35b776bbbf77dfd3bd2e0b17274841ca72f0a
                                                      • Opcode Fuzzy Hash: 7a2ddcbd52f069b3f49569ce8fda4e99ad5a39eb4389677454f43891b999d28c
                                                      • Instruction Fuzzy Hash: 10812B70640626BBCF64AB64EC93FFF376BAF55310F04402DF9056A282EB61D941CB99
                                                      APIs
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013,?,?,?), ref: 0068C788
                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0068C83E
                                                      • SendMessageW.USER32(?,00001102,00000002,?), ref: 0068C859
                                                      • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0068CB15
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window
                                                      • String ID: 0
                                                      • API String ID: 2326795674-4108050209
                                                      • Opcode ID: 64805ead4310e1b3ccdd2b740560804a4db7706d7d96df879c552c19afa611b8
                                                      • Instruction ID: 05dd598659e14961209f1f9c72c4a6a8f3d2cd4176aa4a6859dd0e90c3f2ada7
                                                      • Opcode Fuzzy Hash: 64805ead4310e1b3ccdd2b740560804a4db7706d7d96df879c552c19afa611b8
                                                      • Instruction Fuzzy Hash: A4F1E070104341AFE725AF24C885BAABBE6FF4A324F08072DF599963A1C774D845DFA1
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?,006BDC00), ref: 00686449
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: BuffCharUpper
                                                      • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                      • API String ID: 3964851224-45149045
                                                      • Opcode ID: c818fb0f51674ec799046c364a3ba95f388f34e5762eff940a1032e873fc8d1d
                                                      • Instruction ID: 87cb7d525a150118443e007ea83e13b6c56943af8617d5f6ea3b9e70a11f2042
                                                      • Opcode Fuzzy Hash: c818fb0f51674ec799046c364a3ba95f388f34e5762eff940a1032e873fc8d1d
                                                      • Instruction Fuzzy Hash: DDC16B302042458BCB44FF10C551AAE77A7AF94344F04596DF8966B3E2EB31ED4BCB9A
                                                      APIs
                                                      • GetSysColor.USER32(00000012), ref: 0068D5AE
                                                      • SetTextColor.GDI32(?,?), ref: 0068D5B2
                                                      • GetSysColorBrush.USER32(0000000F), ref: 0068D5C8
                                                      • GetSysColor.USER32(0000000F), ref: 0068D5D3
                                                      • CreateSolidBrush.GDI32(?), ref: 0068D5D8
                                                      • GetSysColor.USER32(00000011), ref: 0068D5F0
                                                      • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0068D5FE
                                                      • SelectObject.GDI32(?,00000000), ref: 0068D60F
                                                      • SetBkColor.GDI32(?,00000000), ref: 0068D618
                                                      • SelectObject.GDI32(?,?), ref: 0068D625
                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 0068D644
                                                      • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0068D65B
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 0068D670
                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0068D698
                                                      • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0068D6BF
                                                      • InflateRect.USER32(?,000000FD,000000FD), ref: 0068D6DD
                                                      • DrawFocusRect.USER32(?,?), ref: 0068D6E8
                                                      • GetSysColor.USER32(00000011), ref: 0068D6F6
                                                      • SetTextColor.GDI32(?,00000000), ref: 0068D6FE
                                                      • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0068D712
                                                      • SelectObject.GDI32(?,0068D2A5), ref: 0068D729
                                                      • DeleteObject.GDI32(?), ref: 0068D734
                                                      • SelectObject.GDI32(?,?), ref: 0068D73A
                                                      • DeleteObject.GDI32(?), ref: 0068D73F
                                                      • SetTextColor.GDI32(?,?), ref: 0068D745
                                                      • SetBkColor.GDI32(?,?), ref: 0068D74F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                      • String ID:
                                                      • API String ID: 1996641542-0
                                                      • Opcode ID: 1df9877c75af33ad6d54e19dc626e7738940bf85281c3b2b635d7482fc9c5b06
                                                      • Instruction ID: c4f1d951e50d715365497b0e40eacc59ff6367b0c7d454472c2abe04a1230f36
                                                      • Opcode Fuzzy Hash: 1df9877c75af33ad6d54e19dc626e7738940bf85281c3b2b635d7482fc9c5b06
                                                      • Instruction Fuzzy Hash: 56512C71900208BFDB10AFA4DC48EEEBB7AEB09324F105515F916AB2E1D775AA40DF60
                                                      APIs
                                                      • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0068B7B0
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0068B7C1
                                                      • CharNextW.USER32(0000014E), ref: 0068B7F0
                                                      • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 0068B831
                                                      • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 0068B847
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0068B858
                                                      • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 0068B875
                                                      • SetWindowTextW.USER32(?,0000014E), ref: 0068B8C7
                                                      • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 0068B8DD
                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 0068B90E
                                                      • _memset.LIBCMT ref: 0068B933
                                                      • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 0068B97C
                                                      • _memset.LIBCMT ref: 0068B9DB
                                                      • SendMessageW.USER32 ref: 0068BA05
                                                      • SendMessageW.USER32(?,00001074,?,00000001), ref: 0068BA5D
                                                      • SendMessageW.USER32(?,0000133D,?,?), ref: 0068BB0A
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 0068BB2C
                                                      • GetMenuItemInfoW.USER32(?), ref: 0068BB76
                                                      • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 0068BBA3
                                                      • DrawMenuBar.USER32(?), ref: 0068BBB2
                                                      • SetWindowTextW.USER32(?,0000014E), ref: 0068BBDA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                      • String ID: 0
                                                      • API String ID: 1073566785-4108050209
                                                      • Opcode ID: 7c1b857fe1baedc62bdb46807d63e9897a5f8d994c4d2ffa7982f92aac1b0d64
                                                      • Instruction ID: ca1553de6b0a59492b03b21cd55975f6c89ecd47d52b4f03bce4eda13f428ffa
                                                      • Opcode Fuzzy Hash: 7c1b857fe1baedc62bdb46807d63e9897a5f8d994c4d2ffa7982f92aac1b0d64
                                                      • Instruction Fuzzy Hash: F1E1C374900219AFDF20EF65CC84EEE7B7AFF05710F14925AF919AA290DB709A41DF60
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Window$Foreground
                                                      • String ID: ACTIVE$ALL$CLASS$H+m$HANDLE$INSTANCE$L+m$LAST$P+m$REGEXPCLASS$REGEXPTITLE$T+m$TITLE
                                                      • API String ID: 62970417-213249025
                                                      • Opcode ID: 43e4070b8a11b7b8030bb4b0ff32edddda1cf2b6a4f3fc9bd0426a4d15922f0a
                                                      • Instruction ID: b128e841a83312ba81a36f779284e98851a672cf067ad369359f9e8eadfe2aba
                                                      • Opcode Fuzzy Hash: 43e4070b8a11b7b8030bb4b0ff32edddda1cf2b6a4f3fc9bd0426a4d15922f0a
                                                      • Instruction Fuzzy Hash: C1D1F530504643BBCF44EF20D4A19EABBABBF64304F104A1DF45657AA1DB30E99ACF95
                                                      APIs
                                                      • GetCursorPos.USER32(?), ref: 0068778A
                                                      • GetDesktopWindow.USER32 ref: 0068779F
                                                      • GetWindowRect.USER32(00000000), ref: 006877A6
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00687808
                                                      • DestroyWindow.USER32(?), ref: 00687834
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 0068785D
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0068787B
                                                      • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 006878A1
                                                      • SendMessageW.USER32(?,00000421,?,?), ref: 006878B6
                                                      • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 006878C9
                                                      • IsWindowVisible.USER32(?), ref: 006878E9
                                                      • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00687904
                                                      • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00687918
                                                      • GetWindowRect.USER32(?,?), ref: 00687930
                                                      • MonitorFromPoint.USER32(?,?,00000002), ref: 00687956
                                                      • GetMonitorInfoW.USER32 ref: 00687970
                                                      • CopyRect.USER32(?,?), ref: 00687987
                                                      • SendMessageW.USER32(?,00000412,00000000), ref: 006879F2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                      • String ID: ($0$tooltips_class32
                                                      • API String ID: 698492251-4156429822
                                                      • Opcode ID: 8dde4e9266fc202ba502f86e2de4c103d77351dbfbbf526d2e01d55ce33ef17b
                                                      • Instruction ID: d2c19579ae2a43c4e60fae7686a0e1f00d7f79db7d297db5583c1e05096f8272
                                                      • Opcode Fuzzy Hash: 8dde4e9266fc202ba502f86e2de4c103d77351dbfbbf526d2e01d55ce33ef17b
                                                      • Instruction Fuzzy Hash: 9EB1B171608301AFDB44EF64C848B5ABBE6FF89310F108A1DF59A9B291D770E805CFA5
                                                      APIs
                                                      • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00666CFB
                                                      • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00666D21
                                                      • _wcscpy.LIBCMT ref: 00666D4F
                                                      • _wcscmp.LIBCMT ref: 00666D5A
                                                      • _wcscat.LIBCMT ref: 00666D70
                                                      • _wcsstr.LIBCMT ref: 00666D7B
                                                      • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00666D97
                                                      • _wcscat.LIBCMT ref: 00666DE0
                                                      • _wcscat.LIBCMT ref: 00666DE7
                                                      • _wcsncpy.LIBCMT ref: 00666E12
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                      • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                      • API String ID: 699586101-1459072770
                                                      • Opcode ID: 276ab0258efb4410fd4ad75b17a20c403f2502e14dc54faaa9288ce61bbacbe1
                                                      • Instruction ID: 293b490d8afda67734e7590b9da3aabb7dd8231edad51a72b9b7796025c1a920
                                                      • Opcode Fuzzy Hash: 276ab0258efb4410fd4ad75b17a20c403f2502e14dc54faaa9288ce61bbacbe1
                                                      • Instruction Fuzzy Hash: 1241D571A00211BBEB40AB64DD47EFF777EDF51710F140029FA05A6282EB75EA0196AA
                                                      APIs
                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0063A939
                                                      • GetSystemMetrics.USER32(00000007), ref: 0063A941
                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0063A96C
                                                      • GetSystemMetrics.USER32(00000008), ref: 0063A974
                                                      • GetSystemMetrics.USER32(00000004), ref: 0063A999
                                                      • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 0063A9B6
                                                      • AdjustWindowRectEx.USER32(000000FF,00000000,00000000,00000000), ref: 0063A9C6
                                                      • CreateWindowExW.USER32(00000000,AutoIt v3 GUI,?,00000000,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0063A9F9
                                                      • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 0063AA0D
                                                      • GetClientRect.USER32(00000000,000000FF), ref: 0063AA2B
                                                      • GetStockObject.GDI32(00000011), ref: 0063AA47
                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 0063AA52
                                                        • Part of subcall function 0063B63C: GetCursorPos.USER32(000000FF), ref: 0063B64F
                                                        • Part of subcall function 0063B63C: ScreenToClient.USER32(00000000,000000FF), ref: 0063B66C
                                                        • Part of subcall function 0063B63C: GetAsyncKeyState.USER32(00000001), ref: 0063B691
                                                        • Part of subcall function 0063B63C: GetAsyncKeyState.USER32(00000002), ref: 0063B69F
                                                      • SetTimer.USER32(00000000,00000000,00000028,0063AB87), ref: 0063AA79
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                      • String ID: AutoIt v3 GUI
                                                      • API String ID: 1458621304-248962490
                                                      • Opcode ID: 2ac2ba779c2b58dd803daa154c2433c71a3ba11260cb1fe4703f6d6972d6e21f
                                                      • Instruction ID: d8c400c91c650a01039a569bae300ec21d41b20da2019fdee1cfecbe1916d532
                                                      • Opcode Fuzzy Hash: 2ac2ba779c2b58dd803daa154c2433c71a3ba11260cb1fe4703f6d6972d6e21f
                                                      • Instruction Fuzzy Hash: F6B17D71A0020A9FDB14DFA8CC45BED7BBAFB09314F115229FA56AB290DB34E841DF51
                                                      APIs
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00683735
                                                      • RegCreateKeyExW.ADVAPI32(?,?,00000000,006BDC00,00000000,?,00000000,?,?), ref: 006837A3
                                                      • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 006837EB
                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00683874
                                                      • RegCloseKey.ADVAPI32(?), ref: 00683B94
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00683BA1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Close$ConnectCreateRegistryValue
                                                      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                      • API String ID: 536824911-966354055
                                                      • Opcode ID: bc60d849a1b15de4c2a5620d38a1fd939160896d3a822ba7d99ca1446af12654
                                                      • Instruction ID: 1f58e0a711a975b672af35b5be2d10dc72caebd360456e625010f8b203117986
                                                      • Opcode Fuzzy Hash: bc60d849a1b15de4c2a5620d38a1fd939160896d3a822ba7d99ca1446af12654
                                                      • Instruction Fuzzy Hash: 59026A75604A219FCB54EF14D851A2AB7E6FF88720F04855DF98A9B3A1CB30ED01CF99
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?), ref: 00686C56
                                                      • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00686D16
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: BuffCharMessageSendUpper
                                                      • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                      • API String ID: 3974292440-719923060
                                                      • Opcode ID: c7e16bbb2b26e20101a36dc6130cbfaff81bed45f6d59526726728811ce5ed0d
                                                      • Instruction ID: a9eb141fa511ed32e94b33cc3cf75a773ba3e1eec70df4fe851ee3a4e11fe80f
                                                      • Opcode Fuzzy Hash: c7e16bbb2b26e20101a36dc6130cbfaff81bed45f6d59526726728811ce5ed0d
                                                      • Instruction Fuzzy Hash: 9AA19E702043419BCB54FF20D851A6AB3A3BF54350F105A6DB9A6AB3D2DF30ED0ACB95
                                                      APIs
                                                      • GetClassNameW.USER32(?,?,00000100), ref: 0065CF91
                                                      • __swprintf.LIBCMT ref: 0065D032
                                                      • _wcscmp.LIBCMT ref: 0065D045
                                                      • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0065D09A
                                                      • _wcscmp.LIBCMT ref: 0065D0D6
                                                      • GetClassNameW.USER32(?,?,00000400), ref: 0065D10D
                                                      • GetDlgCtrlID.USER32(?), ref: 0065D15F
                                                      • GetWindowRect.USER32(?,?), ref: 0065D195
                                                      • GetParent.USER32(?), ref: 0065D1B3
                                                      • ScreenToClient.USER32(00000000), ref: 0065D1BA
                                                      • GetClassNameW.USER32(?,?,00000100), ref: 0065D234
                                                      • _wcscmp.LIBCMT ref: 0065D248
                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 0065D26E
                                                      • _wcscmp.LIBCMT ref: 0065D282
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf
                                                      • String ID: %s%u
                                                      • API String ID: 3119225716-679674701
                                                      • Opcode ID: 74c0485a34f36b3d050455d5bd26f44e96e31e38f0bac4ccc6a3145e3cb2571f
                                                      • Instruction ID: a0e7168f3cf76052d26429d8159c71396ee72446f6e3222456c9051adb34e34a
                                                      • Opcode Fuzzy Hash: 74c0485a34f36b3d050455d5bd26f44e96e31e38f0bac4ccc6a3145e3cb2571f
                                                      • Instruction Fuzzy Hash: F0A1C171604702AFD725DF64C884BEAB7AAFF44355F008519FE9AD22D0DB30EA49CB91
                                                      APIs
                                                      • GetClassNameW.USER32(00000008,?,00000400), ref: 0065D8EB
                                                      • _wcscmp.LIBCMT ref: 0065D8FC
                                                      • GetWindowTextW.USER32(00000001,?,00000400), ref: 0065D924
                                                      • CharUpperBuffW.USER32(?,00000000), ref: 0065D941
                                                      • _wcscmp.LIBCMT ref: 0065D95F
                                                      • _wcsstr.LIBCMT ref: 0065D970
                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 0065D9A8
                                                      • _wcscmp.LIBCMT ref: 0065D9B8
                                                      • GetWindowTextW.USER32(00000002,?,00000400), ref: 0065D9DF
                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 0065DA28
                                                      • _wcscmp.LIBCMT ref: 0065DA38
                                                      • GetClassNameW.USER32(00000010,?,00000400), ref: 0065DA60
                                                      • GetWindowRect.USER32(00000004,?), ref: 0065DAC9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                      • String ID: @$ThumbnailClass
                                                      • API String ID: 1788623398-1539354611
                                                      • Opcode ID: df63e3f98c3371d7c7ea22db2afa42f11278ec4e9fcdba710eabdad9d4962a43
                                                      • Instruction ID: 7c3a96993aed768ef1e42977507cadef27c8c198b18a77d5be13fa9702f4adf7
                                                      • Opcode Fuzzy Hash: df63e3f98c3371d7c7ea22db2afa42f11278ec4e9fcdba710eabdad9d4962a43
                                                      • Instruction Fuzzy Hash: C98191710083059BDB25DF10C885BAA7BEAEF85315F04446AFD899A1D6DB30ED49CBA1
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: __wcsnicmp
                                                      • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                      • API String ID: 1038674560-1810252412
                                                      • Opcode ID: 7e94e1700986a667f4a332df7e85463bfb269b37322a500b1f16f0f4e3008f0d
                                                      • Instruction ID: 95a8314ccc36805381e9acd888e88548c36de7076847a3f1d7d6e517369da7b1
                                                      • Opcode Fuzzy Hash: 7e94e1700986a667f4a332df7e85463bfb269b37322a500b1f16f0f4e3008f0d
                                                      • Instruction Fuzzy Hash: C431B231944616EADB64EB50ED53EED73679F24755F20002EF841711D1EBA1AE08CA19
                                                      APIs
                                                      • LoadIconW.USER32(00000063), ref: 0065EAB0
                                                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0065EAC2
                                                      • SetWindowTextW.USER32(?,?), ref: 0065EAD9
                                                      • GetDlgItem.USER32(?,000003EA), ref: 0065EAEE
                                                      • SetWindowTextW.USER32(00000000,?), ref: 0065EAF4
                                                      • GetDlgItem.USER32(?,000003E9), ref: 0065EB04
                                                      • SetWindowTextW.USER32(00000000,?), ref: 0065EB0A
                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 0065EB2B
                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 0065EB45
                                                      • GetWindowRect.USER32(?,?), ref: 0065EB4E
                                                      • SetWindowTextW.USER32(?,?), ref: 0065EBB9
                                                      • GetDesktopWindow.USER32 ref: 0065EBBF
                                                      • GetWindowRect.USER32(00000000), ref: 0065EBC6
                                                      • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 0065EC12
                                                      • GetClientRect.USER32(?,?), ref: 0065EC1F
                                                      • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 0065EC44
                                                      • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 0065EC6F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                      • String ID:
                                                      • API String ID: 3869813825-0
                                                      • Opcode ID: 5fbfc48893784648663ceb9ec7f5a11f2eafffc4cb3beea1c17265ef31acdf9e
                                                      • Instruction ID: 9ecd5de1aa9ca5edbbf796a55532f4945aea1d801984af801a1ffcc4cbe4b1b2
                                                      • Opcode Fuzzy Hash: 5fbfc48893784648663ceb9ec7f5a11f2eafffc4cb3beea1c17265ef31acdf9e
                                                      • Instruction Fuzzy Hash: 76512F71900709AFDB24EFA8CE85BAEBBF6FF04705F004518E556A66A0D775B948CF10
                                                      APIs
                                                      • LoadCursorW.USER32(00000000,00007F8A), ref: 006779C6
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 006779D1
                                                      • LoadCursorW.USER32(00000000,00007F03), ref: 006779DC
                                                      • LoadCursorW.USER32(00000000,00007F8B), ref: 006779E7
                                                      • LoadCursorW.USER32(00000000,00007F01), ref: 006779F2
                                                      • LoadCursorW.USER32(00000000,00007F81), ref: 006779FD
                                                      • LoadCursorW.USER32(00000000,00007F88), ref: 00677A08
                                                      • LoadCursorW.USER32(00000000,00007F80), ref: 00677A13
                                                      • LoadCursorW.USER32(00000000,00007F86), ref: 00677A1E
                                                      • LoadCursorW.USER32(00000000,00007F83), ref: 00677A29
                                                      • LoadCursorW.USER32(00000000,00007F85), ref: 00677A34
                                                      • LoadCursorW.USER32(00000000,00007F82), ref: 00677A3F
                                                      • LoadCursorW.USER32(00000000,00007F84), ref: 00677A4A
                                                      • LoadCursorW.USER32(00000000,00007F04), ref: 00677A55
                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 00677A60
                                                      • LoadCursorW.USER32(00000000,00007F89), ref: 00677A6B
                                                      • GetCursorInfo.USER32(?), ref: 00677A7B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Cursor$Load$Info
                                                      • String ID:
                                                      • API String ID: 2577412497-0
                                                      • Opcode ID: f055971f11dc8c63e4d0da41fa04df5866a48f1d160968e46b4c692fdaf5f949
                                                      • Instruction ID: 98b3ea365ebc7a0397bf47ab056832b7e18f7daa26c7218e2d2d2205eee5c02b
                                                      • Opcode Fuzzy Hash: f055971f11dc8c63e4d0da41fa04df5866a48f1d160968e46b4c692fdaf5f949
                                                      • Instruction Fuzzy Hash: 123138B0D0831A6ADF509FB68C8999FBFE9FF04750F50453AE50DE7280DA78A5008FA1
                                                      APIs
                                                        • Part of subcall function 0063E968: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,0062C8B7,?,00002000,?,?,00000000,?,0062419E,?,?,?,006BDC00), ref: 0063E984
                                                        • Part of subcall function 0062660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006253B1,?,?,006261FF,?,00000000,00000001,00000000), ref: 0062662F
                                                      • __wsplitpath.LIBCMT ref: 0062C93E
                                                        • Part of subcall function 00641DFC: __wsplitpath_helper.LIBCMT ref: 00641E3C
                                                      • _wcscpy.LIBCMT ref: 0062C953
                                                      • _wcscat.LIBCMT ref: 0062C968
                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 0062C978
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0062CABE
                                                        • Part of subcall function 0062B337: _wcscpy.LIBCMT ref: 0062B36F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectory$_wcscpy$FullNamePath__wsplitpath__wsplitpath_helper_wcscat
                                                      • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                      • API String ID: 2258743419-1018226102
                                                      • Opcode ID: 6c1138a514393dd9e7d7ad7b24a7093fd48b872ba672372c59dd432e012d6cf6
                                                      • Instruction ID: 4901660fc63b38ee3ac828d4944617ad09eb6b5193766692bb6ea0ff8ebcf512
                                                      • Opcode Fuzzy Hash: 6c1138a514393dd9e7d7ad7b24a7093fd48b872ba672372c59dd432e012d6cf6
                                                      • Instruction Fuzzy Hash: 9012BE715083519FCB64EF24D891AAFBBEAAF99310F00491EF48993361DB30DA49CF56
                                                      APIs
                                                      • _memset.LIBCMT ref: 0068CEFB
                                                      • DestroyWindow.USER32(?,?), ref: 0068CF73
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0068CFF4
                                                      • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0068D016
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0068D025
                                                      • DestroyWindow.USER32(?), ref: 0068D042
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00620000,00000000), ref: 0068D075
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0068D094
                                                      • GetDesktopWindow.USER32 ref: 0068D0A9
                                                      • GetWindowRect.USER32(00000000), ref: 0068D0B0
                                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0068D0C2
                                                      • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0068D0DA
                                                        • Part of subcall function 0063B526: GetWindowLongW.USER32(?,000000EB), ref: 0063B537
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memset
                                                      • String ID: 0$tooltips_class32
                                                      • API String ID: 3877571568-3619404913
                                                      • Opcode ID: 2d430e4705bc351ef14963973b8cf5cf15e2a527dd069e696b657b07890761dd
                                                      • Instruction ID: 16ff3829965a39554508c99a9cc95321025b782bb63658d89773953690debbc2
                                                      • Opcode Fuzzy Hash: 2d430e4705bc351ef14963973b8cf5cf15e2a527dd069e696b657b07890761dd
                                                      • Instruction Fuzzy Hash: 9B71DF70140345AFD724EF28CC85FA67BE6EB89704F44561DF9858B3A1D731E942DB22
                                                      APIs
                                                        • Part of subcall function 0063B34E: GetWindowLongW.USER32(?,000000EB), ref: 0063B35F
                                                      • DragQueryPoint.SHELL32(?,?), ref: 0068F37A
                                                        • Part of subcall function 0068D7DE: ClientToScreen.USER32(?,?), ref: 0068D807
                                                        • Part of subcall function 0068D7DE: GetWindowRect.USER32(?,?), ref: 0068D87D
                                                        • Part of subcall function 0068D7DE: PtInRect.USER32(?,?,0068ED5A), ref: 0068D88D
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 0068F3E3
                                                      • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0068F3EE
                                                      • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0068F411
                                                      • _wcscat.LIBCMT ref: 0068F441
                                                      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0068F458
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 0068F471
                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 0068F488
                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 0068F4AA
                                                      • DragFinish.SHELL32(?), ref: 0068F4B1
                                                      • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0068F59C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                      • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                      • API String ID: 169749273-3440237614
                                                      • Opcode ID: 21b9602607e7f579a210dff9bbd9cf12d4bb9d368ebb37838e1c014873163ec5
                                                      • Instruction ID: 263250ea8f22ce62f60130bee7e833425317e7c7d8e9062a282ce2093e153a5d
                                                      • Opcode Fuzzy Hash: 21b9602607e7f579a210dff9bbd9cf12d4bb9d368ebb37838e1c014873163ec5
                                                      • Instruction Fuzzy Hash: 31615971508301AFC311EF64DC85E9FBBFAEF99710F000A1EF595961A1DB70AA09CB56
                                                      APIs
                                                      • VariantInit.OLEAUT32(00000000), ref: 0066AB3D
                                                      • VariantCopy.OLEAUT32(?,?), ref: 0066AB46
                                                      • VariantClear.OLEAUT32(?), ref: 0066AB52
                                                      • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 0066AC40
                                                      • __swprintf.LIBCMT ref: 0066AC70
                                                      • VarR8FromDec.OLEAUT32(?,?), ref: 0066AC9C
                                                      • VariantInit.OLEAUT32(?), ref: 0066AD4D
                                                      • SysFreeString.OLEAUT32(00000016), ref: 0066ADDF
                                                      • VariantClear.OLEAUT32(?), ref: 0066AE35
                                                      • VariantClear.OLEAUT32(?), ref: 0066AE44
                                                      • VariantInit.OLEAUT32(00000000), ref: 0066AE80
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                                      • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                      • API String ID: 3730832054-3931177956
                                                      • Opcode ID: 70650fc21c006e585b6e2641ebf5de94b186d72e2ed59e5e4f9812c9d6971f6a
                                                      • Instruction ID: cf869e8fdb29a0979fe56b386c6015e28fa470ba6e72299ec01ae2ef3022ba77
                                                      • Opcode Fuzzy Hash: 70650fc21c006e585b6e2641ebf5de94b186d72e2ed59e5e4f9812c9d6971f6a
                                                      • Instruction Fuzzy Hash: 1ED1E071A04615EBCB209FA6D885BAEF7B7FF09700F148059E405AB281DB74EC41DFA6
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?), ref: 006871FC
                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00687247
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: BuffCharMessageSendUpper
                                                      • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                      • API String ID: 3974292440-4258414348
                                                      • Opcode ID: 5b7534f92ea24176bab4b983226cb0aa190d919f96d47330aff75bae5d6a7435
                                                      • Instruction ID: 58aabdddf054747994bffbb68ac65c4543c9bdd5cfb04a15a2b8e662a26d4968
                                                      • Opcode Fuzzy Hash: 5b7534f92ea24176bab4b983226cb0aa190d919f96d47330aff75bae5d6a7435
                                                      • Instruction Fuzzy Hash: 74916E702087019BCB44FF10C851A6EBBA3AF94310F14595DF8966B3A3DB31ED4ADB99
                                                      APIs
                                                      • EnumChildWindows.USER32(?,0065CF50), ref: 0065CE90
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ChildEnumWindows
                                                      • String ID: 4+m$CLASS$CLASSNN$H+m$INSTANCE$L+m$NAME$P+m$REGEXPCLASS$T+m$TEXT
                                                      • API String ID: 3555792229-4238710086
                                                      • Opcode ID: 5ff09170f3923e20b451f32eabd2f4189b57853fe95b0541b4643d27acc8fcd9
                                                      • Instruction ID: 9ab21f543cb768f619321455900225fd3f7725508ee17ec5749b8cf54d4659a0
                                                      • Opcode Fuzzy Hash: 5ff09170f3923e20b451f32eabd2f4189b57853fe95b0541b4643d27acc8fcd9
                                                      • Instruction Fuzzy Hash: FC919330900606AECB58DF60C482BEDFB77BF14315F50851AE859A7291DF30A95EDBE4
                                                      APIs
                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0068E5AB
                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,0068BEAF), ref: 0068E607
                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0068E647
                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0068E68C
                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0068E6C3
                                                      • FreeLibrary.KERNEL32(?,00000004,?,?,?,?,0068BEAF), ref: 0068E6CF
                                                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0068E6DF
                                                      • DestroyIcon.USER32(?,?,?,?,?,0068BEAF), ref: 0068E6EE
                                                      • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0068E70B
                                                      • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0068E717
                                                        • Part of subcall function 00640FA7: __wcsicmp_l.LIBCMT ref: 00641030
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                      • String ID: .dll$.exe$.icl
                                                      • API String ID: 1212759294-1154884017
                                                      • Opcode ID: 8bf4adfdabf40d17d91d0ced5d5232b3f4484ed6c60fe05cf1e5a1b944a8c4eb
                                                      • Instruction ID: f219f7e25049e0241585742aa6aca5c44d412da5e27c49598c31cdbeb900da73
                                                      • Opcode Fuzzy Hash: 8bf4adfdabf40d17d91d0ced5d5232b3f4484ed6c60fe05cf1e5a1b944a8c4eb
                                                      • Instruction Fuzzy Hash: 2C61D171940615FAEB14EF64CC46FFE7BAABF18714F104215F915E61D0EB71A980CBA0
                                                      APIs
                                                        • Part of subcall function 0062936C: __swprintf.LIBCMT ref: 006293AB
                                                        • Part of subcall function 0062936C: __itow.LIBCMT ref: 006293DF
                                                      • CharLowerBuffW.USER32(?,?), ref: 0066D292
                                                      • GetDriveTypeW.KERNEL32 ref: 0066D2DF
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0066D327
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0066D35E
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0066D38C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: SendString$BuffCharDriveLowerType__itow__swprintf
                                                      • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                      • API String ID: 1148790751-4113822522
                                                      • Opcode ID: 614d7d8bdac6542ef12ec94b0eaecd5db7ea9c02412657c3bd364f54c8b3fe6d
                                                      • Instruction ID: 2a64437de0ec3cb38030d257c57cda8ff19a7793d60f0372c1454f2bb4fab7bb
                                                      • Opcode Fuzzy Hash: 614d7d8bdac6542ef12ec94b0eaecd5db7ea9c02412657c3bd364f54c8b3fe6d
                                                      • Instruction Fuzzy Hash: 215157716047159FC740EF10D8819AEB7EAEF98718F04482DF896673A1DB31AE06CF96
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000016,00000000,?,?,00693973,00000016,0000138C,00000016,?,00000016,006BDDB4,00000000,?), ref: 006626F1
                                                      • LoadStringW.USER32(00000000,?,00693973,00000016), ref: 006626FA
                                                      • GetModuleHandleW.KERNEL32(00000000,00000016,?,00000FFF,?,?,00693973,00000016,0000138C,00000016,?,00000016,006BDDB4,00000000,?,00000016), ref: 0066271C
                                                      • LoadStringW.USER32(00000000,?,00693973,00000016), ref: 0066271F
                                                      • __swprintf.LIBCMT ref: 0066276F
                                                      • __swprintf.LIBCMT ref: 00662780
                                                      • _wprintf.LIBCMT ref: 00662829
                                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00662840
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadModuleString__swprintf$Message_wprintf
                                                      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                      • API String ID: 618562835-2268648507
                                                      • Opcode ID: 2f96b088d60ecb5857529533b0e05d396c413eae756c0a5878e59964a2983545
                                                      • Instruction ID: a1a964b0551e969ea65b988108da37de66e08db521885ecbc4e384ae433cc183
                                                      • Opcode Fuzzy Hash: 2f96b088d60ecb5857529533b0e05d396c413eae756c0a5878e59964a2983545
                                                      • Instruction Fuzzy Hash: 9F415E72800629BBCB54FBE0ED96DEEB77AAF15340F100069B50277092EA706F59CF65
                                                      APIs
                                                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0066D0D8
                                                      • __swprintf.LIBCMT ref: 0066D0FA
                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 0066D137
                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0066D15C
                                                      • _memset.LIBCMT ref: 0066D17B
                                                      • _wcsncpy.LIBCMT ref: 0066D1B7
                                                      • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0066D1EC
                                                      • CloseHandle.KERNEL32(00000000), ref: 0066D1F7
                                                      • RemoveDirectoryW.KERNEL32(?), ref: 0066D200
                                                      • CloseHandle.KERNEL32(00000000), ref: 0066D20A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                      • String ID: :$\$\??\%s
                                                      • API String ID: 2733774712-3457252023
                                                      • Opcode ID: 846c49dcace1f81bae8db510ebf64f992d7a70c7ee3b345063dcecd56069ad28
                                                      • Instruction ID: 454ed49fb85175f3f0cb5806df7562f6c88d44bb48e3e7b17d5dc65dc2ce6913
                                                      • Opcode Fuzzy Hash: 846c49dcace1f81bae8db510ebf64f992d7a70c7ee3b345063dcecd56069ad28
                                                      • Instruction Fuzzy Hash: 56319671A00119ABDB21DFA0DC49FEB77BEEF8A740F1040B9F609D6160E770A7458B24
                                                      APIs
                                                      • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,0068BEF4,?,?), ref: 0068E754
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,0068BEF4,?,?,00000000,?), ref: 0068E76B
                                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,0068BEF4,?,?,00000000,?), ref: 0068E776
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,0068BEF4,?,?,00000000,?), ref: 0068E783
                                                      • GlobalLock.KERNEL32(00000000), ref: 0068E78C
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,0068BEF4,?,?,00000000,?), ref: 0068E79B
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0068E7A4
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,0068BEF4,?,?,00000000,?), ref: 0068E7AB
                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,0068BEF4,?,?,00000000,?), ref: 0068E7BC
                                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,006AD9BC,?), ref: 0068E7D5
                                                      • GlobalFree.KERNEL32(00000000), ref: 0068E7E5
                                                      • GetObjectW.GDI32(00000000,00000018,?), ref: 0068E809
                                                      • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 0068E834
                                                      • DeleteObject.GDI32(00000000), ref: 0068E85C
                                                      • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0068E872
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                      • String ID:
                                                      • API String ID: 3840717409-0
                                                      • Opcode ID: 78a01480146986ca1ba93602c4117c3522c960e1fd306f96c689849a3cb4a2ba
                                                      • Instruction ID: c7b725f99dc98ea3d20397dded482498a77a27a377108f507f051c53abbb318b
                                                      • Opcode Fuzzy Hash: 78a01480146986ca1ba93602c4117c3522c960e1fd306f96c689849a3cb4a2ba
                                                      • Instruction Fuzzy Hash: 7341F875600204EFDB11AF65DC88EAE7BBAEF8A715F108168F90697260D731AD41DF60
                                                      APIs
                                                      • __wsplitpath.LIBCMT ref: 0067076F
                                                      • _wcscat.LIBCMT ref: 00670787
                                                      • _wcscat.LIBCMT ref: 00670799
                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 006707AE
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 006707C2
                                                      • GetFileAttributesW.KERNEL32(?), ref: 006707DA
                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 006707F4
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00670806
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                      • String ID: *.*
                                                      • API String ID: 34673085-438819550
                                                      • Opcode ID: f551100ab9f6b95b7802c4693d20f720768ba4489d1a32b3e9797e61b47937ce
                                                      • Instruction ID: 3670305ab915ec7a73316d1cb46d63707065b8ac379a696a695de68f937c576c
                                                      • Opcode Fuzzy Hash: f551100ab9f6b95b7802c4693d20f720768ba4489d1a32b3e9797e61b47937ce
                                                      • Instruction Fuzzy Hash: EE817071504301DFEB64EF24C8559AEB7EABBC9304F14882EF889D7351E630E9558FA2
                                                      APIs
                                                        • Part of subcall function 0063B34E: GetWindowLongW.USER32(?,000000EB), ref: 0063B35F
                                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0068EF3B
                                                      • GetFocus.USER32 ref: 0068EF4B
                                                      • GetDlgCtrlID.USER32(00000000), ref: 0068EF56
                                                      • _memset.LIBCMT ref: 0068F081
                                                      • GetMenuItemInfoW.USER32 ref: 0068F0AC
                                                      • GetMenuItemCount.USER32(00000000), ref: 0068F0CC
                                                      • GetMenuItemID.USER32(?,00000000), ref: 0068F0DF
                                                      • GetMenuItemInfoW.USER32(00000000,-00000001,00000001,?), ref: 0068F113
                                                      • GetMenuItemInfoW.USER32(00000000,?,00000001,?), ref: 0068F15B
                                                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0068F193
                                                      • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0068F1C8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                      • String ID: 0
                                                      • API String ID: 1296962147-4108050209
                                                      • Opcode ID: f8152ca8bcef69ecdd76e6dd07249f2997725b7443ae336021c77adfcfeebf30
                                                      • Instruction ID: 90decd540377a394a6f82b95436d5fddbec7ce1befaf8f462f308346a81c1918
                                                      • Opcode Fuzzy Hash: f8152ca8bcef69ecdd76e6dd07249f2997725b7443ae336021c77adfcfeebf30
                                                      • Instruction Fuzzy Hash: 6A817E71608301EFD710EF14C888AABBBEAFB89314F14462EF99597291D771D905CBA2
                                                      APIs
                                                        • Part of subcall function 0065ABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 0065ABD7
                                                        • Part of subcall function 0065ABBB: GetLastError.KERNEL32(?,0065A69F,?,?,?), ref: 0065ABE1
                                                        • Part of subcall function 0065ABBB: GetProcessHeap.KERNEL32(00000008,?,?,0065A69F,?,?,?), ref: 0065ABF0
                                                        • Part of subcall function 0065ABBB: HeapAlloc.KERNEL32(00000000,?,0065A69F,?,?,?), ref: 0065ABF7
                                                        • Part of subcall function 0065ABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0065AC0E
                                                        • Part of subcall function 0065AC56: GetProcessHeap.KERNEL32(00000008,0065A6B5,00000000,00000000,?,0065A6B5,?), ref: 0065AC62
                                                        • Part of subcall function 0065AC56: HeapAlloc.KERNEL32(00000000,?,0065A6B5,?), ref: 0065AC69
                                                        • Part of subcall function 0065AC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,0065A6B5,?), ref: 0065AC7A
                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0065A8CB
                                                      • _memset.LIBCMT ref: 0065A8E0
                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0065A8FF
                                                      • GetLengthSid.ADVAPI32(?), ref: 0065A910
                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 0065A94D
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 0065A969
                                                      • GetLengthSid.ADVAPI32(?), ref: 0065A986
                                                      • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 0065A995
                                                      • HeapAlloc.KERNEL32(00000000), ref: 0065A99C
                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0065A9BD
                                                      • CopySid.ADVAPI32(00000000), ref: 0065A9C4
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 0065A9F5
                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 0065AA1B
                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 0065AA2F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                      • String ID:
                                                      • API String ID: 3996160137-0
                                                      • Opcode ID: 849e5c61876667bbba91f7ab8227ed92150cf360ee6668b81b07afc7489e1f7e
                                                      • Instruction ID: 8114e4cd8a16bc929f084f19c49467efceb1c16f60a4a7d0853714f4b7fdd67b
                                                      • Opcode Fuzzy Hash: 849e5c61876667bbba91f7ab8227ed92150cf360ee6668b81b07afc7489e1f7e
                                                      • Instruction Fuzzy Hash: AE513C71900219AFDF10DF94DD85AEEBB7AFF05301F04821AF956A7290DB359A09CF61
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: LoadString__swprintf_wprintf
                                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                      • API String ID: 2889450990-2391861430
                                                      • Opcode ID: ed82c39bbf3ec5ba3cf460b2c181a39db2afaa4c1e3a193e9d44b0b3aa2c70fd
                                                      • Instruction ID: 0de0a2e7a1e5ad22c2003d80a075ea4f32ad040965c1762dce9f9b5623402677
                                                      • Opcode Fuzzy Hash: ed82c39bbf3ec5ba3cf460b2c181a39db2afaa4c1e3a193e9d44b0b3aa2c70fd
                                                      • Instruction Fuzzy Hash: EA51B031800A19BBCB54EBA0DD86EEEB77AAF05350F10006AF405761A2EB316F59DF65
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: LoadString__swprintf_wprintf
                                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                      • API String ID: 2889450990-3420473620
                                                      • Opcode ID: c3dd2ff546671afd050421591e6a5b7e9f8a96b41623c3fbf8b0fbd86d95a141
                                                      • Instruction ID: b577c2302ed27187541c1a7161f49d9ca191d6d59889fd4fc351070d93fcc868
                                                      • Opcode Fuzzy Hash: c3dd2ff546671afd050421591e6a5b7e9f8a96b41623c3fbf8b0fbd86d95a141
                                                      • Instruction Fuzzy Hash: 2051D171900A19AACF14EBE0DD46EEEB77AAF05340F10006AF40677192EB706F99DF65
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00682BB5,?,?), ref: 00683C1D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: BuffCharUpper
                                                      • String ID: $Em$HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                      • API String ID: 3964851224-3613096251
                                                      • Opcode ID: bc8b1f698e50a254e708cb890e9da22e8d6ef39da18b8fa15d5dce6fff6e33b2
                                                      • Instruction ID: abc4d16b10f469160e60c9818fc1c45127584725c402ce13c60da79216eb191e
                                                      • Opcode Fuzzy Hash: bc8b1f698e50a254e708cb890e9da22e8d6ef39da18b8fa15d5dce6fff6e33b2
                                                      • Instruction Fuzzy Hash: B441403051025A8BCF54FF10E851AEE3767EF22740F106959EC652B392EB71AE0ACB64
                                                      APIs
                                                      • _memset.LIBCMT ref: 006655D7
                                                      • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00665664
                                                      • GetMenuItemCount.USER32(006E1708), ref: 006656ED
                                                      • DeleteMenu.USER32(006E1708,00000005,00000000,000000F5,?,?), ref: 0066577D
                                                      • DeleteMenu.USER32(006E1708,00000004,00000000), ref: 00665785
                                                      • DeleteMenu.USER32(006E1708,00000006,00000000), ref: 0066578D
                                                      • DeleteMenu.USER32(006E1708,00000003,00000000), ref: 00665795
                                                      • GetMenuItemCount.USER32(006E1708), ref: 0066579D
                                                      • SetMenuItemInfoW.USER32(006E1708,00000004,00000000,00000030), ref: 006657D3
                                                      • GetCursorPos.USER32(?), ref: 006657DD
                                                      • SetForegroundWindow.USER32(00000000), ref: 006657E6
                                                      • TrackPopupMenuEx.USER32(006E1708,00000000,?,00000000,00000000,00000000), ref: 006657F9
                                                      • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00665805
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                      • String ID:
                                                      • API String ID: 3993528054-0
                                                      • Opcode ID: edd00755b4d118992774ef390ee1393770451aff0b64ce3f4ce8eb077eb6a32a
                                                      • Instruction ID: 009cbfd8c29d5fcb9d27716cc5e8f6e6ed36a1aa481027953121803dc8413408
                                                      • Opcode Fuzzy Hash: edd00755b4d118992774ef390ee1393770451aff0b64ce3f4ce8eb077eb6a32a
                                                      • Instruction Fuzzy Hash: 6671E370640615BFEB209F54CC4AFEABF66FF01364F240209F516AA2E1C7B16C10DBA4
                                                      APIs
                                                      • _memset.LIBCMT ref: 0065A1DC
                                                      • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 0065A211
                                                      • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0065A22D
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 0065A249
                                                      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 0065A273
                                                      • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 0065A29B
                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0065A2A6
                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0065A2AB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset
                                                      • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                      • API String ID: 1687751970-22481851
                                                      • Opcode ID: 2384893c52f65fd2473d3ab0ed976d9dbee28888696e11bf0f8377b8bacb8c38
                                                      • Instruction ID: a251db24ed676e7767a74815b0a958fddac9a5197373c096f8035a903aa8dba6
                                                      • Opcode Fuzzy Hash: 2384893c52f65fd2473d3ab0ed976d9dbee28888696e11bf0f8377b8bacb8c38
                                                      • Instruction Fuzzy Hash: 8F41F876C10629ABDB21EBA4EC95DEDB77ABF14350F044169F902A3260EA709E09CF54
                                                      APIs
                                                      • __swprintf.LIBCMT ref: 006667FD
                                                      • __swprintf.LIBCMT ref: 0066680A
                                                        • Part of subcall function 0064172B: __woutput_l.LIBCMT ref: 00641784
                                                      • FindResourceW.KERNEL32(?,?,0000000E), ref: 00666834
                                                      • LoadResource.KERNEL32(?,00000000), ref: 00666840
                                                      • LockResource.KERNEL32(00000000), ref: 0066684D
                                                      • FindResourceW.KERNEL32(?,?,00000003), ref: 0066686D
                                                      • LoadResource.KERNEL32(?,00000000), ref: 0066687F
                                                      • SizeofResource.KERNEL32(?,00000000), ref: 0066688E
                                                      • LockResource.KERNEL32(?), ref: 0066689A
                                                      • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 006668F9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                      • String ID: 5m
                                                      • API String ID: 1433390588-1963150287
                                                      • Opcode ID: 3b6eba522e28dee20956446ada0293cc964ad7e8582bde4c237a1eb0d0cb7dbd
                                                      • Instruction ID: e45f1516dd9141c301c90a748f0f608b7297057705bbbe7649e9e96172ac0085
                                                      • Opcode Fuzzy Hash: 3b6eba522e28dee20956446ada0293cc964ad7e8582bde4c237a1eb0d0cb7dbd
                                                      • Instruction Fuzzy Hash: 55318E7190025AABDB10AF71ED45AFE7BAAEF09344B108429F912D7250E730DA51DBB4
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,006936F4,00000010,?,Bad directive syntax error,006BDC00,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 006625D6
                                                      • LoadStringW.USER32(00000000,?,006936F4,00000010), ref: 006625DD
                                                      • _wprintf.LIBCMT ref: 00662610
                                                      • __swprintf.LIBCMT ref: 00662632
                                                      • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 006626A1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadMessageModuleString__swprintf_wprintf
                                                      • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                      • API String ID: 1080873982-4153970271
                                                      • Opcode ID: bc0f9c320a4316a7d0d1c7227ff6ef701efbf61ad6b8e5bf6d24ced47f37afd1
                                                      • Instruction ID: dd420c900ea8b97f89a92251be3308c1a6dbbb6187f0b85012f33d6d60c9fef5
                                                      • Opcode Fuzzy Hash: bc0f9c320a4316a7d0d1c7227ff6ef701efbf61ad6b8e5bf6d24ced47f37afd1
                                                      • Instruction Fuzzy Hash: 06218231C0062ABFCF11BF90DC0AEEE773ABF19304F000459F506661A2DA71AA64DF55
                                                      APIs
                                                      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00667B42
                                                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00667B58
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00667B69
                                                      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00667B7B
                                                      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00667B8C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: SendString
                                                      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                      • API String ID: 890592661-1007645807
                                                      • Opcode ID: df235194103938666c4c6f9bef7ef2fe970a81cee2740e2f5d12e51190f4b2a8
                                                      • Instruction ID: 56c820bfa04a331d844c1577a8dd42fb608c9ef68f5d5f9e3c24c81a5518a473
                                                      • Opcode Fuzzy Hash: df235194103938666c4c6f9bef7ef2fe970a81cee2740e2f5d12e51190f4b2a8
                                                      • Instruction Fuzzy Hash: 371104B0A4067A79D720B761DC4ADFF7B7EEBD1B10F00042AB411A32C0DA700A44CAB5
                                                      APIs
                                                      • timeGetTime.WINMM ref: 00667794
                                                        • Part of subcall function 0063DC38: timeGetTime.WINMM(?,75A8B400,006958AB), ref: 0063DC3C
                                                      • Sleep.KERNEL32(0000000A), ref: 006677C0
                                                      • EnumThreadWindows.USER32(?,Function_00047744,00000000), ref: 006677E4
                                                      • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00667806
                                                      • SetActiveWindow.USER32 ref: 00667825
                                                      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00667833
                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00667852
                                                      • Sleep.KERNEL32(000000FA), ref: 0066785D
                                                      • IsWindow.USER32 ref: 00667869
                                                      • EndDialog.USER32(00000000), ref: 0066787A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                      • String ID: BUTTON
                                                      • API String ID: 1194449130-3405671355
                                                      • Opcode ID: ed6081eeacfa54dc8b60615c00d15c3d685071ed5b824cc7eef39f106c93d5e7
                                                      • Instruction ID: 3b16a89a63d55d7e2808e5f6684b4973bde8d733d8168a9a3ad08c444b14d52d
                                                      • Opcode Fuzzy Hash: ed6081eeacfa54dc8b60615c00d15c3d685071ed5b824cc7eef39f106c93d5e7
                                                      • Instruction Fuzzy Hash: 362135B0214385BFE7006B20EC8DE6A3F6BFB05348F042068F50687762DB71AD00DE24
                                                      APIs
                                                        • Part of subcall function 0062936C: __swprintf.LIBCMT ref: 006293AB
                                                        • Part of subcall function 0062936C: __itow.LIBCMT ref: 006293DF
                                                      • CoInitialize.OLE32(00000000), ref: 0067034B
                                                      • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 006703DE
                                                      • SHGetDesktopFolder.SHELL32(?), ref: 006703F2
                                                      • CoCreateInstance.OLE32(006ADA8C,00000000,00000001,006D3CF8,?), ref: 0067043E
                                                      • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 006704AD
                                                      • CoTaskMemFree.OLE32(?,?), ref: 00670505
                                                      • _memset.LIBCMT ref: 00670542
                                                      • SHBrowseForFolderW.SHELL32(?), ref: 0067057E
                                                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 006705A1
                                                      • CoTaskMemFree.OLE32(00000000), ref: 006705A8
                                                      • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 006705DF
                                                      • CoUninitialize.OLE32(00000001,00000000), ref: 006705E1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                      • String ID:
                                                      • API String ID: 1246142700-0
                                                      • Opcode ID: 6d715690b9225ffaf96180bbcd633530f102d50e2c21d9418473984e68f77ef9
                                                      • Instruction ID: dce620a16b3d37bae9312065482f8bc44ae26226e9af9fbc0f19a367bdd2e174
                                                      • Opcode Fuzzy Hash: 6d715690b9225ffaf96180bbcd633530f102d50e2c21d9418473984e68f77ef9
                                                      • Instruction Fuzzy Hash: 4CB1D975A00119EFDB04DFA4C988DAEBBBAEF48314B148499E90AEB251D730ED41CF64
                                                      APIs
                                                      • GetKeyboardState.USER32(?), ref: 00662ED6
                                                      • SetKeyboardState.USER32(?), ref: 00662F41
                                                      • GetAsyncKeyState.USER32(000000A0), ref: 00662F61
                                                      • GetKeyState.USER32(000000A0), ref: 00662F78
                                                      • GetAsyncKeyState.USER32(000000A1), ref: 00662FA7
                                                      • GetKeyState.USER32(000000A1), ref: 00662FB8
                                                      • GetAsyncKeyState.USER32(00000011), ref: 00662FE4
                                                      • GetKeyState.USER32(00000011), ref: 00662FF2
                                                      • GetAsyncKeyState.USER32(00000012), ref: 0066301B
                                                      • GetKeyState.USER32(00000012), ref: 00663029
                                                      • GetAsyncKeyState.USER32(0000005B), ref: 00663052
                                                      • GetKeyState.USER32(0000005B), ref: 00663060
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: State$Async$Keyboard
                                                      • String ID:
                                                      • API String ID: 541375521-0
                                                      • Opcode ID: c4b2bc36d1866917d1f51e77ab9ce1ff08718cdeec4e864a8651f52918f1a36f
                                                      • Instruction ID: b91ea79d6aa51e5f0edf46b33b47cebaaa074851cb076a0cfb8491a58c0820d4
                                                      • Opcode Fuzzy Hash: c4b2bc36d1866917d1f51e77ab9ce1ff08718cdeec4e864a8651f52918f1a36f
                                                      • Instruction Fuzzy Hash: B051FB20A04BD529FB35DBB489207EABFF65F12340F08459DC5C2563C2DA649B8CC7A6
                                                      APIs
                                                      • GetDlgItem.USER32(?,00000001), ref: 0065ED1E
                                                      • GetWindowRect.USER32(00000000,?), ref: 0065ED30
                                                      • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0065ED8E
                                                      • GetDlgItem.USER32(?,00000002), ref: 0065ED99
                                                      • GetWindowRect.USER32(00000000,?), ref: 0065EDAB
                                                      • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0065EE01
                                                      • GetDlgItem.USER32(?,000003E9), ref: 0065EE0F
                                                      • GetWindowRect.USER32(00000000,?), ref: 0065EE20
                                                      • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0065EE63
                                                      • GetDlgItem.USER32(?,000003EA), ref: 0065EE71
                                                      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0065EE8E
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 0065EE9B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Window$ItemMoveRect$Invalidate
                                                      • String ID:
                                                      • API String ID: 3096461208-0
                                                      • Opcode ID: f5504b7bdeb60e8a0032226fd7d1527afee342268a29f846f9ceec220721c960
                                                      • Instruction ID: 4a8a14b34d8dfd325805e974f0af3365941c497ec5564403d31f836c4188ee09
                                                      • Opcode Fuzzy Hash: f5504b7bdeb60e8a0032226fd7d1527afee342268a29f846f9ceec220721c960
                                                      • Instruction Fuzzy Hash: 3B513371B00205AFDF18DF68DD85AAEBBB6FB89301F14912DF91AD7290D771AE048B10
                                                      APIs
                                                        • Part of subcall function 0063B9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,0063B759,?,00000000,?,?,?,?,0063B72B,00000000,?), ref: 0063BA58
                                                      • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,?,0063B72B), ref: 0063B7F6
                                                      • KillTimer.USER32(00000000,?,00000000,?,?,?,?,0063B72B,00000000,?,?,0063B2EF,?,?), ref: 0063B88D
                                                      • DestroyAcceleratorTable.USER32(00000000), ref: 0069D8A6
                                                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,0063B72B,00000000,?,?,0063B2EF,?,?), ref: 0069D8D7
                                                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,0063B72B,00000000,?,?,0063B2EF,?,?), ref: 0069D8EE
                                                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,0063B72B,00000000,?,?,0063B2EF,?,?), ref: 0069D90A
                                                      • DeleteObject.GDI32(00000000), ref: 0069D91C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                      • String ID:
                                                      • API String ID: 641708696-0
                                                      • Opcode ID: 1b7245c2de67fb1e5bc847d7422e7257a33955079c3745c429bedc3de01bc57a
                                                      • Instruction ID: 5d5744b444b0af066195b816c7ecbf1b87d8c44838f6d056fcc4c062834dbdfa
                                                      • Opcode Fuzzy Hash: 1b7245c2de67fb1e5bc847d7422e7257a33955079c3745c429bedc3de01bc57a
                                                      • Instruction Fuzzy Hash: FC617B30501740DFDB25AF18D988BA5B7FBFF96316F14652DE2468AA60C770A881EF84
                                                      APIs
                                                        • Part of subcall function 0063B526: GetWindowLongW.USER32(?,000000EB), ref: 0063B537
                                                      • GetSysColor.USER32(0000000F), ref: 0063B438
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ColorLongWindow
                                                      • String ID:
                                                      • API String ID: 259745315-0
                                                      • Opcode ID: 90bef84830d60550b9a4366cb2df3649bbfba2af97295350c335fb64db0dc0f9
                                                      • Instruction ID: 3a80f4819ee71d3667896fcf39000d1f469fb8e8640ac49fd279c88f587c18d4
                                                      • Opcode Fuzzy Hash: 90bef84830d60550b9a4366cb2df3649bbfba2af97295350c335fb64db0dc0f9
                                                      • Instruction Fuzzy Hash: 5741B5301001449FDF246F28D889BF937A7AB06730F145265FE668E6EBD7319C42DBA5
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                      • String ID:
                                                      • API String ID: 136442275-0
                                                      • Opcode ID: 5c42bb9c9f3b368608b6c9efe265b9274ae361669c5593db7026a23b7921c74e
                                                      • Instruction ID: aff50ba10d46e86c8a16c5d805fec35cad2f9f5c0c8481734af51a215099a7b0
                                                      • Opcode Fuzzy Hash: 5c42bb9c9f3b368608b6c9efe265b9274ae361669c5593db7026a23b7921c74e
                                                      • Instruction Fuzzy Hash: 4441127684512CAEDFA1DB94DC85DDF73BEEF44300F0041AAB659A2051EA30ABD98F54
                                                      APIs
                                                      • CharLowerBuffW.USER32(006BDC00,006BDC00,006BDC00), ref: 0066D7CE
                                                      • GetDriveTypeW.KERNEL32(?,006D3A70,00000061), ref: 0066D898
                                                      • _wcscpy.LIBCMT ref: 0066D8C2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: BuffCharDriveLowerType_wcscpy
                                                      • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                      • API String ID: 2820617543-1000479233
                                                      • Opcode ID: d45a2d029d3af9845f39fb04fc60927a085c660a4ac2ec0df03b1d147bacec6b
                                                      • Instruction ID: 18da3fdfafee25e81f193af50b035bd839450e1aff0af62142e7211efd9000a9
                                                      • Opcode Fuzzy Hash: d45a2d029d3af9845f39fb04fc60927a085c660a4ac2ec0df03b1d147bacec6b
                                                      • Instruction Fuzzy Hash: CA51C731A04300AFC740EF14D891AAEB7A7EF94314F14992DF5AA573A2DB31ED05CB96
                                                      APIs
                                                      • __swprintf.LIBCMT ref: 006293AB
                                                      • __itow.LIBCMT ref: 006293DF
                                                        • Part of subcall function 00641557: _xtow@16.LIBCMT ref: 00641578
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: __itow__swprintf_xtow@16
                                                      • String ID: %.15g$0x%p$False$True
                                                      • API String ID: 1502193981-2263619337
                                                      • Opcode ID: e346c6a568e7685a962ef9e64317547c21355be155f929cb385b218ac361faed
                                                      • Instruction ID: 59141d6b51dac739585cca02dd004e0e33cdef9f044e4e72a6a4a89e661e9e2f
                                                      • Opcode Fuzzy Hash: e346c6a568e7685a962ef9e64317547c21355be155f929cb385b218ac361faed
                                                      • Instruction Fuzzy Hash: 8941C571904614EFDB24DB74E941EAA73FAEF88350F20446EE149D7282EA319942CB65
                                                      APIs
                                                      • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0068A259
                                                      • CreateCompatibleDC.GDI32(00000000), ref: 0068A260
                                                      • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 0068A273
                                                      • SelectObject.GDI32(00000000,00000000), ref: 0068A27B
                                                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 0068A286
                                                      • DeleteDC.GDI32(00000000), ref: 0068A28F
                                                      • GetWindowLongW.USER32(?,000000EC), ref: 0068A299
                                                      • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 0068A2AD
                                                      • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 0068A2B9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                      • String ID: static
                                                      • API String ID: 2559357485-2160076837
                                                      • Opcode ID: 82c226813516dbf804ac34f39141f1854de5838aceaf1b8747a51a4f4179739b
                                                      • Instruction ID: b1aa58ab382371084d6355d552a61bab63fb1bce3e5f0e18cb42dfe1556ac44b
                                                      • Opcode Fuzzy Hash: 82c226813516dbf804ac34f39141f1854de5838aceaf1b8747a51a4f4179739b
                                                      • Instruction Fuzzy Hash: 9F319231100115BBEF21AFA4DC49FDA3B6AFF0E360F141315F916961A0C731E811DB64
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: _wcscpy$CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                      • String ID: 0.0.0.0
                                                      • API String ID: 2620052-3771769585
                                                      • Opcode ID: f2224f389197c71e4d32aa5e7a31f0c26a5a1e9c111a56f51c264651c90ce613
                                                      • Instruction ID: aa21435735f192f4535eb597966d984d59fe3a2a6b1fd84e02f529f368f934d6
                                                      • Opcode Fuzzy Hash: f2224f389197c71e4d32aa5e7a31f0c26a5a1e9c111a56f51c264651c90ce613
                                                      • Instruction Fuzzy Hash: 30110671904215AFDB24BB70FC0AEDA77AFEF41710F000069F106A6181FF70EA858B55
                                                      APIs
                                                      • _memset.LIBCMT ref: 00645047
                                                        • Part of subcall function 00647C0E: __getptd_noexit.LIBCMT ref: 00647C0E
                                                      • __gmtime64_s.LIBCMT ref: 006450E0
                                                      • __gmtime64_s.LIBCMT ref: 00645116
                                                      • __gmtime64_s.LIBCMT ref: 00645133
                                                      • __allrem.LIBCMT ref: 00645189
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006451A5
                                                      • __allrem.LIBCMT ref: 006451BC
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006451DA
                                                      • __allrem.LIBCMT ref: 006451F1
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0064520F
                                                      • __invoke_watson.LIBCMT ref: 00645280
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                      • String ID:
                                                      • API String ID: 384356119-0
                                                      • Opcode ID: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                      • Instruction ID: bd29da6f4a3ef3adbbe531363105289fa7cbae70b787ff4c6b2a1a3e7c7a84fe
                                                      • Opcode Fuzzy Hash: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                      • Instruction Fuzzy Hash: 6C71FA75A00F17ABD714AE78CC41BAA73AAAF01764F14422EF912DB782E770DD4487D4
                                                      APIs
                                                      • _memset.LIBCMT ref: 00664DF8
                                                      • GetMenuItemInfoW.USER32(006E1708,000000FF,00000000,00000030), ref: 00664E59
                                                      • SetMenuItemInfoW.USER32(006E1708,00000004,00000000,00000030), ref: 00664E8F
                                                      • Sleep.KERNEL32(000001F4), ref: 00664EA1
                                                      • GetMenuItemCount.USER32(?), ref: 00664EE5
                                                      • GetMenuItemID.USER32(?,00000000), ref: 00664F01
                                                      • GetMenuItemID.USER32(?,-00000001), ref: 00664F2B
                                                      • GetMenuItemID.USER32(?,?), ref: 00664F70
                                                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00664FB6
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00664FCA
                                                      • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00664FEB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                      • String ID:
                                                      • API String ID: 4176008265-0
                                                      • Opcode ID: 7310ba7c53fb3c6c3947db626a977e10d3500518f93ec57b4205b8931ac849da
                                                      • Instruction ID: 5052f37ba04244d27df0bfebfc7e6030d18e46f0c5b72452b327c53daffbfbbd
                                                      • Opcode Fuzzy Hash: 7310ba7c53fb3c6c3947db626a977e10d3500518f93ec57b4205b8931ac849da
                                                      • Instruction Fuzzy Hash: 936193B1900289AFDB61DFA4DC84DEE7BBAFB85304F144059F442A7251DB31AD45DB21
                                                      APIs
                                                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00689C98
                                                      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00689C9B
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00689CBF
                                                      • _memset.LIBCMT ref: 00689CD0
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00689CE2
                                                      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00689D5A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$LongWindow_memset
                                                      • String ID:
                                                      • API String ID: 830647256-0
                                                      • Opcode ID: 76bb21c7c36b09ca3b1bda5a81d9b950f4892de440c25ab09d3f32441fb6f074
                                                      • Instruction ID: 383047a701e47510afc90ef9b8b7ab08f219139fc5d1d55c8c2b3f649260003b
                                                      • Opcode Fuzzy Hash: 76bb21c7c36b09ca3b1bda5a81d9b950f4892de440c25ab09d3f32441fb6f074
                                                      • Instruction Fuzzy Hash: DF617B75900248AFDB11EFA8CC81EFE77B9EF09704F144259FA05AB2A1D770AD42DB64
                                                      APIs
                                                      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,?), ref: 006594FE
                                                      • SafeArrayAllocData.OLEAUT32(?), ref: 00659549
                                                      • VariantInit.OLEAUT32(?), ref: 0065955B
                                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 0065957B
                                                      • VariantCopy.OLEAUT32(?,?), ref: 006595BE
                                                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 006595D2
                                                      • VariantClear.OLEAUT32(?), ref: 006595E7
                                                      • SafeArrayDestroyData.OLEAUT32(?), ref: 006595F4
                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 006595FD
                                                      • VariantClear.OLEAUT32(?), ref: 0065960F
                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0065961A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                      • String ID:
                                                      • API String ID: 2706829360-0
                                                      • Opcode ID: 5ee69f1aa8e22f035af1d1b6bac5c9b53dc2747ab84e9a897bbc51e30611175e
                                                      • Instruction ID: a389cb20f713cf8ff3d991df8ff16b01ab79658b532493706b6d51d69cda6f8d
                                                      • Opcode Fuzzy Hash: 5ee69f1aa8e22f035af1d1b6bac5c9b53dc2747ab84e9a897bbc51e30611175e
                                                      • Instruction Fuzzy Hash: 10412C71900219EFCB01EFA4DC449DEBBBAFF09355F008069F912A3251DB31AA59CFA5
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit$_memset
                                                      • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop$h?m$|?m
                                                      • API String ID: 2862541840-333645321
                                                      • Opcode ID: 902af8c8760fa0acbf293ab5e98a5b319a81353e19cad29e2ff92e457b4e15ac
                                                      • Instruction ID: 02c6b4b4c34578f90b59582426342eb7bc393750d99b8ba0f7214a7600807b62
                                                      • Opcode Fuzzy Hash: 902af8c8760fa0acbf293ab5e98a5b319a81353e19cad29e2ff92e457b4e15ac
                                                      • Instruction Fuzzy Hash: 66919F71A00219ABDF24DF94C844FEEBBBAEF45710F10D55AF919AB280DB709941CFA0
                                                      APIs
                                                        • Part of subcall function 0062936C: __swprintf.LIBCMT ref: 006293AB
                                                        • Part of subcall function 0062936C: __itow.LIBCMT ref: 006293DF
                                                      • CoInitialize.OLE32 ref: 0067ADF6
                                                      • CoUninitialize.OLE32 ref: 0067AE01
                                                      • CoCreateInstance.OLE32(?,00000000,00000017,006AD8FC,?), ref: 0067AE61
                                                      • IIDFromString.OLE32(?,?), ref: 0067AED4
                                                      • VariantInit.OLEAUT32(?), ref: 0067AF6E
                                                      • VariantClear.OLEAUT32(?), ref: 0067AFCF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                      • API String ID: 834269672-1287834457
                                                      • Opcode ID: 5ff72cc10bc36b5e91ab5fe1eccdc868c555a75ed1817057ad8863178b8d877c
                                                      • Instruction ID: fcc9615ed983b62d121e93719aaf222a50c27efbfff2de334a8a8dd86bd42bd0
                                                      • Opcode Fuzzy Hash: 5ff72cc10bc36b5e91ab5fe1eccdc868c555a75ed1817057ad8863178b8d877c
                                                      • Instruction Fuzzy Hash: 72619A702087119FC710EFA4C844BAEBBEAAF89714F10851DF98A9B291C774ED45CB97
                                                      APIs
                                                      • WSAStartup.WSOCK32(00000101,?), ref: 00678168
                                                      • inet_addr.WSOCK32(?,?,?), ref: 006781AD
                                                      • gethostbyname.WSOCK32(?), ref: 006781B9
                                                      • IcmpCreateFile.IPHLPAPI ref: 006781C7
                                                      • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00678237
                                                      • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 0067824D
                                                      • IcmpCloseHandle.IPHLPAPI(00000000), ref: 006782C2
                                                      • WSACleanup.WSOCK32 ref: 006782C8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                      • String ID: Ping
                                                      • API String ID: 1028309954-2246546115
                                                      • Opcode ID: ec4f797e992edb242e32dd7a7df9b83b3e70aff8f4c898f319678b7db5094be1
                                                      • Instruction ID: 851e7e7d5752222b60a7ba52b74ac496e222462e50b7836428d3293b95e82fce
                                                      • Opcode Fuzzy Hash: ec4f797e992edb242e32dd7a7df9b83b3e70aff8f4c898f319678b7db5094be1
                                                      • Instruction Fuzzy Hash: 9C51A1316447019FD750AF24DC49B6ABBE6AF49321F048829F96AD73A2DB30ED01CF85
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 0066E396
                                                      • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0066E40C
                                                      • GetLastError.KERNEL32 ref: 0066E416
                                                      • SetErrorMode.KERNEL32(00000000,READY), ref: 0066E483
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Error$Mode$DiskFreeLastSpace
                                                      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                      • API String ID: 4194297153-14809454
                                                      • Opcode ID: 8e893735e33b90069638e5aed454c4b293709cc7a40e41194e509080a3ed2f36
                                                      • Instruction ID: cb7360710ae5dd038fd2f69ea30456f85888f562cd417b660022277b16e72771
                                                      • Opcode Fuzzy Hash: 8e893735e33b90069638e5aed454c4b293709cc7a40e41194e509080a3ed2f36
                                                      • Instruction Fuzzy Hash: D1316139A002199FDB01EF68D945AFDB7F6EF55310F14802AE506EB391DA71AA02CB91
                                                      APIs
                                                      • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 0065B98C
                                                      • GetDlgCtrlID.USER32 ref: 0065B997
                                                      • GetParent.USER32 ref: 0065B9B3
                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 0065B9B6
                                                      • GetDlgCtrlID.USER32(?), ref: 0065B9BF
                                                      • GetParent.USER32(?), ref: 0065B9DB
                                                      • SendMessageW.USER32(00000000,?,?,00000111), ref: 0065B9DE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CtrlParent
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 1383977212-1403004172
                                                      • Opcode ID: f64573f02f48e3c4687c0b9803685700b71581fd4b6a4dc7e2d6b95412108285
                                                      • Instruction ID: 85bda3f2b9dfbbfc6595ea866a9d3858952424f761ab43d59d8a9798fd5f1b1a
                                                      • Opcode Fuzzy Hash: f64573f02f48e3c4687c0b9803685700b71581fd4b6a4dc7e2d6b95412108285
                                                      • Instruction Fuzzy Hash: A421F574900104BFDB04ABA4DC86EFEBB76EF5A311F10111AFA52932E1DBB45819DF24
                                                      APIs
                                                      • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 0065BA73
                                                      • GetDlgCtrlID.USER32 ref: 0065BA7E
                                                      • GetParent.USER32 ref: 0065BA9A
                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 0065BA9D
                                                      • GetDlgCtrlID.USER32(?), ref: 0065BAA6
                                                      • GetParent.USER32(?), ref: 0065BAC2
                                                      • SendMessageW.USER32(00000000,?,?,00000111), ref: 0065BAC5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CtrlParent
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 1383977212-1403004172
                                                      • Opcode ID: f999b9457e7da39384d57272994361df4dc992ab6a24f975a0dd1ddf04589fd3
                                                      • Instruction ID: 911fd7ebc579aeb41515e6a9c76c0bfbf05c31c6a9afef7bd5832d28c233f6b7
                                                      • Opcode Fuzzy Hash: f999b9457e7da39384d57272994361df4dc992ab6a24f975a0dd1ddf04589fd3
                                                      • Instruction Fuzzy Hash: 4421B0B4A00108BFDB04AFA4DC85EFEBB7AEF45301F141019F952A7291DBB5591ADF24
                                                      APIs
                                                      • GetParent.USER32 ref: 0065BAE3
                                                      • GetClassNameW.USER32(00000000,?,00000100), ref: 0065BAF8
                                                      • _wcscmp.LIBCMT ref: 0065BB0A
                                                      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0065BB85
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameParentSend_wcscmp
                                                      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                      • API String ID: 1704125052-3381328864
                                                      • Opcode ID: 1afbc1e0906a24c4425efe699655658326a6f775fff095b5c3aef0c79bbe36e6
                                                      • Instruction ID: 5fc1884b622257045d7a4575dd6b61acd198f39e16eb1474e4f7e4fe80260512
                                                      • Opcode Fuzzy Hash: 1afbc1e0906a24c4425efe699655658326a6f775fff095b5c3aef0c79bbe36e6
                                                      • Instruction Fuzzy Hash: BA110676608707FAFB246624DC17DE6379FDB21720F201026FE05E41D5FFE168564918
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 0067B2D5
                                                      • CoInitialize.OLE32(00000000), ref: 0067B302
                                                      • CoUninitialize.OLE32 ref: 0067B30C
                                                      • GetRunningObjectTable.OLE32(00000000,?), ref: 0067B40C
                                                      • SetErrorMode.KERNEL32(00000001,00000029), ref: 0067B539
                                                      • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002), ref: 0067B56D
                                                      • CoGetObject.OLE32(?,00000000,006AD91C,?), ref: 0067B590
                                                      • SetErrorMode.KERNEL32(00000000), ref: 0067B5A3
                                                      • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0067B623
                                                      • VariantClear.OLEAUT32(006AD91C), ref: 0067B633
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                      • String ID:
                                                      • API String ID: 2395222682-0
                                                      • Opcode ID: fe1861a29fbb3e821e9cb1569fa50723f006c8dde07c7734f7ab5a438b710072
                                                      • Instruction ID: dc9e74c0b3c14a8e3671b84fd16aa0efacf44acab60c6e40f156ea61bdb4b1e9
                                                      • Opcode Fuzzy Hash: fe1861a29fbb3e821e9cb1569fa50723f006c8dde07c7734f7ab5a438b710072
                                                      • Instruction Fuzzy Hash: C2C123B1608305AFD700DF64C884A6BB7EABF89308F04995DF58A9B251DB71ED05CB52
                                                      APIs
                                                      • __lock.LIBCMT ref: 0064ACC1
                                                        • Part of subcall function 00647CF4: __mtinitlocknum.LIBCMT ref: 00647D06
                                                        • Part of subcall function 00647CF4: EnterCriticalSection.KERNEL32(00000000,?,00647ADD,0000000D), ref: 00647D1F
                                                      • __calloc_crt.LIBCMT ref: 0064ACD2
                                                        • Part of subcall function 00646986: __calloc_impl.LIBCMT ref: 00646995
                                                        • Part of subcall function 00646986: Sleep.KERNEL32(00000000,000003BC,0063F507,?,0000000E), ref: 006469AC
                                                      • @_EH4_CallFilterFunc@8.LIBCMT ref: 0064ACED
                                                      • GetStartupInfoW.KERNEL32(?,006D6E28,00000064,00645E91,006D6C70,00000014), ref: 0064AD46
                                                      • __calloc_crt.LIBCMT ref: 0064AD91
                                                      • GetFileType.KERNEL32(00000001), ref: 0064ADD8
                                                      • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000D,00000FA0), ref: 0064AE11
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection__calloc_crt$CallCountEnterFileFilterFunc@8InfoInitializeSleepSpinStartupType__calloc_impl__lock__mtinitlocknum
                                                      • String ID:
                                                      • API String ID: 1426640281-0
                                                      • Opcode ID: 62a273e4423cb6d4164c7d05f603bb22abc0016192ddeb2f5b4610ad150d621f
                                                      • Instruction ID: 9b33dda174c4cc1f88a1e1582a0bd27abe15488637bf6f9c207334308cdea84d
                                                      • Opcode Fuzzy Hash: 62a273e4423cb6d4164c7d05f603bb22abc0016192ddeb2f5b4610ad150d621f
                                                      • Instruction Fuzzy Hash: C781F771D45341AFDB14CFA8C8805ADBBF2AF06324B24525DE4B6AB3D1C7349843DB56
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 00664047
                                                      • GetForegroundWindow.USER32(00000000,?,?,?,?,?,006630A5,?,00000001), ref: 0066405B
                                                      • GetWindowThreadProcessId.USER32(00000000), ref: 00664062
                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,006630A5,?,00000001), ref: 00664071
                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00664083
                                                      • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,006630A5,?,00000001), ref: 0066409C
                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,006630A5,?,00000001), ref: 006640AE
                                                      • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,006630A5,?,00000001), ref: 006640F3
                                                      • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,006630A5,?,00000001), ref: 00664108
                                                      • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,006630A5,?,00000001), ref: 00664113
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                      • String ID:
                                                      • API String ID: 2156557900-0
                                                      • Opcode ID: ad73b8b80d31306d153e789abac839f8afb5256aa0448771aa1cd079dc356b73
                                                      • Instruction ID: d808e4b24511b81d2a94a2ccb8a8fe5e0d86abb1b30ff6a5d7c4c988e18ebc0c
                                                      • Opcode Fuzzy Hash: ad73b8b80d31306d153e789abac839f8afb5256aa0448771aa1cd079dc356b73
                                                      • Instruction Fuzzy Hash: DE3181B1500324ABDB10DF55DC8ABB9B7ABAB66711F209005F905DB390CFB4ED808F60
                                                      APIs
                                                      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 006230DC
                                                      • CoUninitialize.OLE32(?,00000000), ref: 00623181
                                                      • UnregisterHotKey.USER32(?), ref: 006232A9
                                                      • DestroyWindow.USER32(?), ref: 00695079
                                                      • FreeLibrary.KERNEL32(?), ref: 006950F8
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00695125
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                      • String ID: close all
                                                      • API String ID: 469580280-3243417748
                                                      • Opcode ID: 9f8a57b275b1476b04587a1b2664f7bc336acb6f470ab6de33c212609a05f6b8
                                                      • Instruction ID: 8d8e80b299ca81e7666b71e5f6e3aabafdb6fa693b0086ca936ff59dd8363ca3
                                                      • Opcode Fuzzy Hash: 9f8a57b275b1476b04587a1b2664f7bc336acb6f470ab6de33c212609a05f6b8
                                                      • Instruction Fuzzy Hash: 1D914D30600A22CFCB45EF14D895AA8F3AAFF15304F5481ADE50A67762DF34AE56CF58
                                                      APIs
                                                      • SetWindowLongW.USER32(?,000000EB), ref: 0063CC15
                                                        • Part of subcall function 0063CCCD: GetClientRect.USER32(?,?), ref: 0063CCF6
                                                        • Part of subcall function 0063CCCD: GetWindowRect.USER32(?,?), ref: 0063CD37
                                                        • Part of subcall function 0063CCCD: ScreenToClient.USER32(?,?), ref: 0063CD5F
                                                      • GetDC.USER32 ref: 0069D137
                                                      • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0069D14A
                                                      • SelectObject.GDI32(00000000,00000000), ref: 0069D158
                                                      • SelectObject.GDI32(00000000,00000000), ref: 0069D16D
                                                      • ReleaseDC.USER32(?,00000000), ref: 0069D175
                                                      • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0069D200
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                      • String ID: U
                                                      • API String ID: 4009187628-3372436214
                                                      • Opcode ID: 5755304d0e6221baed4fc18becfb72232b5f9bc10659a420e804d3b199b027ca
                                                      • Instruction ID: d9bac798f4e842e0372dffb2bff0563341d540bcf5b3770a3a2b2e3dce02575a
                                                      • Opcode Fuzzy Hash: 5755304d0e6221baed4fc18becfb72232b5f9bc10659a420e804d3b199b027ca
                                                      • Instruction Fuzzy Hash: 8971EC31400205DFCF219F64CC81AEA7BBBFF49364F14526AFD566A6A6C7308842DFA0
                                                      APIs
                                                        • Part of subcall function 0063B34E: GetWindowLongW.USER32(?,000000EB), ref: 0063B35F
                                                        • Part of subcall function 0063B63C: GetCursorPos.USER32(000000FF), ref: 0063B64F
                                                        • Part of subcall function 0063B63C: ScreenToClient.USER32(00000000,000000FF), ref: 0063B66C
                                                        • Part of subcall function 0063B63C: GetAsyncKeyState.USER32(00000001), ref: 0063B691
                                                        • Part of subcall function 0063B63C: GetAsyncKeyState.USER32(00000002), ref: 0063B69F
                                                      • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?), ref: 0068ED3C
                                                      • ImageList_EndDrag.COMCTL32 ref: 0068ED42
                                                      • ReleaseCapture.USER32 ref: 0068ED48
                                                      • SetWindowTextW.USER32(?,00000000), ref: 0068EDF0
                                                      • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0068EE03
                                                      • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?), ref: 0068EEDC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                      • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                      • API String ID: 1924731296-2107944366
                                                      • Opcode ID: e7156d72bf3fa69f223859e167b930c234292d871d3cb3aa721b638ceadad4ae
                                                      • Instruction ID: d702930df1061df152157eb5b35368cc4284865310f593b93fbfe6cd8d05c6ed
                                                      • Opcode Fuzzy Hash: e7156d72bf3fa69f223859e167b930c234292d871d3cb3aa721b638ceadad4ae
                                                      • Instruction Fuzzy Hash: 26519870204304AFD710EF24DC9AFAA77E6AB89314F005A1DF9959B2E2DB71A944CF52
                                                      APIs
                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 006745FF
                                                      • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0067462B
                                                      • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 0067466D
                                                      • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00674682
                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0067468F
                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 006746BF
                                                      • InternetCloseHandle.WININET(00000000), ref: 00674706
                                                        • Part of subcall function 00675052: GetLastError.KERNEL32(?,?,006743CC,00000000,00000000,00000001), ref: 00675067
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorHandleInfoLastOpenSend
                                                      • String ID:
                                                      • API String ID: 1241431887-3916222277
                                                      • Opcode ID: 352f2dfcba2893738c0b30324d54893f1b36d228974e920f2829b8d949bfab47
                                                      • Instruction ID: f3ad44e0bcc5295e2f906732181e872f2e5d2260dd2da051834056c43baec9e0
                                                      • Opcode Fuzzy Hash: 352f2dfcba2893738c0b30324d54893f1b36d228974e920f2829b8d949bfab47
                                                      • Instruction Fuzzy Hash: C9417EB1501215BFEB059F50CC89FFA77AEFF09354F00801AFA0A9A251DBB0D9458BA4
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,?,006BDC00), ref: 0067B715
                                                      • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,006BDC00), ref: 0067B749
                                                      • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 0067B8C1
                                                      • SysFreeString.OLEAUT32(?), ref: 0067B8EB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                      • String ID:
                                                      • API String ID: 560350794-0
                                                      • Opcode ID: c0cb889ad6a60640c9a0ef566fa4b0a77cd9e7a90dab0f714f4aadefd69d7d24
                                                      • Instruction ID: 5776060695d3900c852ec3d5a440729a7fff5b27864f614b994c1f683c0d6fe0
                                                      • Opcode Fuzzy Hash: c0cb889ad6a60640c9a0ef566fa4b0a77cd9e7a90dab0f714f4aadefd69d7d24
                                                      • Instruction Fuzzy Hash: 8CF10875A00219EFCF04EF94C884EAEB7BAFF49315F109459F919AB250DB31AE46CB50
                                                      APIs
                                                      • _memset.LIBCMT ref: 006824F5
                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00682688
                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 006826AC
                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 006826EC
                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0068270E
                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0068286F
                                                      • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 006828A1
                                                      • CloseHandle.KERNEL32(?), ref: 006828D0
                                                      • CloseHandle.KERNEL32(?), ref: 00682947
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                      • String ID:
                                                      • API String ID: 4090791747-0
                                                      • Opcode ID: eb2e306bcbf0a2a410b308d6ca66b193c9370924fcced8e1854c0df91eec1c96
                                                      • Instruction ID: b15eb37d0aeba58dacfc13df985e9bc0e40629d2c76dc6d3220f342ebe8ff06f
                                                      • Opcode Fuzzy Hash: eb2e306bcbf0a2a410b308d6ca66b193c9370924fcced8e1854c0df91eec1c96
                                                      • Instruction Fuzzy Hash: A6D1AF71604201DFCB54EF24C8A1A6EBBE6AF85320F14855DF9899B3A2DB30EC45CF56
                                                      APIs
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0068B3F4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: InvalidateRect
                                                      • String ID:
                                                      • API String ID: 634782764-0
                                                      • Opcode ID: 040c58dc2df1d7053b8fbac5664a1ad65b789f1da043983c71e5203fbbdd1026
                                                      • Instruction ID: 3e798b1264e05f652df7754abbdf9bfca5e875d7305b8502f418db0daf9802f7
                                                      • Opcode Fuzzy Hash: 040c58dc2df1d7053b8fbac5664a1ad65b789f1da043983c71e5203fbbdd1026
                                                      • Instruction Fuzzy Hash: 3D51A230600204BFEF34BF28CC86BAD7BA7AB06314F646215F615E66E2C771E984DB55
                                                      APIs
                                                      • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0069DB1B
                                                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0069DB3C
                                                      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0069DB51
                                                      • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0069DB6E
                                                      • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0069DB95
                                                      • DestroyIcon.USER32(00000000,?,?,?,?,?,?,0063A67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 0069DBA0
                                                      • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0069DBBD
                                                      • DestroyIcon.USER32(00000000,?,?,?,?,?,?,0063A67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 0069DBC8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                      • String ID:
                                                      • API String ID: 1268354404-0
                                                      • Opcode ID: 910b09f554adbc5cc8d2871835b7cab25b8608c860ff261d1f1352c02c1645fb
                                                      • Instruction ID: 68c6db9eaf148c42e875bebe62b8d3c745e0194f8b44579e1378bd15e9e991fe
                                                      • Opcode Fuzzy Hash: 910b09f554adbc5cc8d2871835b7cab25b8608c860ff261d1f1352c02c1645fb
                                                      • Instruction Fuzzy Hash: 71515B74600309EFDF24DF68CC91FAA77FAAB49754F100529F9869B690D770AD80EB90
                                                      APIs
                                                        • Part of subcall function 00666EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00665FA6,?), ref: 00666ED8
                                                        • Part of subcall function 00666EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00665FA6,?), ref: 00666EF1
                                                        • Part of subcall function 006672CB: GetFileAttributesW.KERNEL32(?,00666019), ref: 006672CC
                                                      • lstrcmpiW.KERNEL32(?,?), ref: 006675CA
                                                      • _wcscmp.LIBCMT ref: 006675E2
                                                      • MoveFileW.KERNEL32(?,?), ref: 006675FB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                      • String ID:
                                                      • API String ID: 793581249-0
                                                      • Opcode ID: 4df10ae2ceebf14dc1b06d2ad6bd7eb99cad079737a9c4a253bfa1de6ff1924d
                                                      • Instruction ID: 1f4a9655b5a934afb0d7037f6625f93b212d891604ad5c1ae2bd610e8309c042
                                                      • Opcode Fuzzy Hash: 4df10ae2ceebf14dc1b06d2ad6bd7eb99cad079737a9c4a253bfa1de6ff1924d
                                                      • Instruction Fuzzy Hash: 6D511FB2A092299ADF94EB94D881DDE73BE9F08314F1040AEF609E3541EA74D7C5CF64
                                                      APIs
                                                      • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,0069DAD1,00000004,00000000,00000000), ref: 0063EAEB
                                                      • ShowWindow.USER32(00000000,00000000,00000000,00000000,00000000,?,0069DAD1,00000004,00000000,00000000), ref: 0063EB32
                                                      • ShowWindow.USER32(00000000,00000006,00000000,00000000,00000000,?,0069DAD1,00000004,00000000,00000000), ref: 0069DC86
                                                      • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,0069DAD1,00000004,00000000,00000000), ref: 0069DCF2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ShowWindow
                                                      • String ID:
                                                      • API String ID: 1268545403-0
                                                      • Opcode ID: b5f074e52ed5f95ac0c3addd6a4d2fb1a438fc8d898552d8837696e9be735e58
                                                      • Instruction ID: d51b069c66a84c8bbd787cd5e48dd49c4f7a3acf5d95666e25432300d45e7199
                                                      • Opcode Fuzzy Hash: b5f074e52ed5f95ac0c3addd6a4d2fb1a438fc8d898552d8837696e9be735e58
                                                      • Instruction Fuzzy Hash: 2941D870605680DBDF3A5B288F8DABABA9FAB52304F19141DE04746AE1C772BC41D7B1
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,0065AEF1,00000B00,?,?), ref: 0065B26C
                                                      • HeapAlloc.KERNEL32(00000000,?,0065AEF1,00000B00,?,?), ref: 0065B273
                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,0065AEF1,00000B00,?,?), ref: 0065B288
                                                      • GetCurrentProcess.KERNEL32(?,00000000,?,0065AEF1,00000B00,?,?), ref: 0065B290
                                                      • DuplicateHandle.KERNEL32(00000000,?,0065AEF1,00000B00,?,?), ref: 0065B293
                                                      • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,0065AEF1,00000B00,?,?), ref: 0065B2A3
                                                      • GetCurrentProcess.KERNEL32(0065AEF1,00000000,?,0065AEF1,00000B00,?,?), ref: 0065B2AB
                                                      • DuplicateHandle.KERNEL32(00000000,?,0065AEF1,00000B00,?,?), ref: 0065B2AE
                                                      • CreateThread.KERNEL32(00000000,00000000,0065B2D4,00000000,00000000,00000000), ref: 0065B2C8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                      • String ID:
                                                      • API String ID: 1957940570-0
                                                      • Opcode ID: f2f64545ff0b39e9e7c8a584f29f6aae231f52343fc1a32e9536f3b35066cdae
                                                      • Instruction ID: b3b882c8758f9bf40121687acb16196ed68245cc5d363feb9414ebcab35ab1e3
                                                      • Opcode Fuzzy Hash: f2f64545ff0b39e9e7c8a584f29f6aae231f52343fc1a32e9536f3b35066cdae
                                                      • Instruction Fuzzy Hash: 5701BBB5240304BFEB10BBA5DC49F6B7BADEB8A711F019411FA06DB5A1CA75AC00CF61
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: NULL Pointer assignment$Not an Object type
                                                      • API String ID: 0-572801152
                                                      • Opcode ID: 032cc593d13c172a0cbf5b3dd4f695543ac4c9f6a618df9582e41877bc2e05bd
                                                      • Instruction ID: dac89c7f0983e1778700d015fe77cb42830d3f70e24165e50df80d59c560d7ce
                                                      • Opcode Fuzzy Hash: 032cc593d13c172a0cbf5b3dd4f695543ac4c9f6a618df9582e41877bc2e05bd
                                                      • Instruction Fuzzy Hash: D1E19371A00219ABDF14DFA4D891AEE77BBEF48324F14812DF909AB381D770AD45CB94
                                                      APIs
                                                        • Part of subcall function 0062936C: __swprintf.LIBCMT ref: 006293AB
                                                        • Part of subcall function 0062936C: __itow.LIBCMT ref: 006293DF
                                                        • Part of subcall function 0063C6F4: _wcscpy.LIBCMT ref: 0063C717
                                                      • _wcstok.LIBCMT ref: 0067184E
                                                      • _wcscpy.LIBCMT ref: 006718DD
                                                      • _memset.LIBCMT ref: 00671910
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                      • String ID: X$p2ml2m
                                                      • API String ID: 774024439-1579325628
                                                      • Opcode ID: 029c53fc8b39ce23f32c93a5fc766617c7bdf32ef109001e80ea5cc90674551d
                                                      • Instruction ID: d34e1d680e157e9f63eebc0b1e9347fd986ac90edcddf792c89f9d75e9364bf8
                                                      • Opcode Fuzzy Hash: 029c53fc8b39ce23f32c93a5fc766617c7bdf32ef109001e80ea5cc90674551d
                                                      • Instruction Fuzzy Hash: BFC191305047519FC764EF28D891A9AB7E2BF85350F00892EF9899B3A1DB30ED05CF86
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: _memset
                                                      • String ID: Q\E$[$\$\$]$^
                                                      • API String ID: 2102423945-1026548749
                                                      • Opcode ID: 78de932c79a87264b310a9088af48c10cb1da59e5da323074149df02d6cbee0a
                                                      • Instruction ID: 751f428f04229c2c1abac70e070adf5b2bc4b9c472a639ba29b0d71b45d0661b
                                                      • Opcode Fuzzy Hash: 78de932c79a87264b310a9088af48c10cb1da59e5da323074149df02d6cbee0a
                                                      • Instruction Fuzzy Hash: 1F519B71E016299FCF24CF98D881AEDB7B7AF94304F29816AD814B7351E7309D858F91
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00689B19
                                                      • SendMessageW.USER32(?,00001036,00000000,?), ref: 00689B2D
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00689B47
                                                      • _wcscat.LIBCMT ref: 00689BA2
                                                      • SendMessageW.USER32(?,00001057,00000000,?), ref: 00689BB9
                                                      • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00689BE7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window_wcscat
                                                      • String ID: SysListView32
                                                      • API String ID: 307300125-78025650
                                                      • Opcode ID: 48732b6e4d3629b0daf715c36eb7a89576948e240c126974fa9eaad78ec7456f
                                                      • Instruction ID: fd3b5513513e42d570ae27f22ce2d3061b7b877d0a39fe0674242a9adc9a1f89
                                                      • Opcode Fuzzy Hash: 48732b6e4d3629b0daf715c36eb7a89576948e240c126974fa9eaad78ec7456f
                                                      • Instruction Fuzzy Hash: 6641C270900308AFDB21AFA4CC85BEE77BAEF08350F14052AF549A7291D7719D85CB64
                                                      APIs
                                                        • Part of subcall function 00666532: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00666554
                                                        • Part of subcall function 00666532: Process32FirstW.KERNEL32(00000000,0000022C), ref: 00666564
                                                        • Part of subcall function 00666532: CloseHandle.KERNEL32(00000000,?,00000000), ref: 006665F9
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0068179A
                                                      • GetLastError.KERNEL32 ref: 006817AD
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 006817D9
                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 00681855
                                                      • GetLastError.KERNEL32(00000000), ref: 00681860
                                                      • CloseHandle.KERNEL32(00000000), ref: 00681895
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                      • String ID: SeDebugPrivilege
                                                      • API String ID: 2533919879-2896544425
                                                      • Opcode ID: d70b6a8ff1445e4e2ceadac4517d9b327c348e35e4cdaa694edf57aec03b4435
                                                      • Instruction ID: 55067d04b127318b73fe1dabf699c220c2129b5f4e6a66af693de16863678120
                                                      • Opcode Fuzzy Hash: d70b6a8ff1445e4e2ceadac4517d9b327c348e35e4cdaa694edf57aec03b4435
                                                      • Instruction Fuzzy Hash: 4441A8B1600201AFDB45FF54C9A6FADB7ABAF45310F04905CF9069F382DB78A9068F95
                                                      APIs
                                                      • LoadIconW.USER32(00000000,00007F03), ref: 006658B8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: IconLoad
                                                      • String ID: blank$info$question$stop$warning
                                                      • API String ID: 2457776203-404129466
                                                      • Opcode ID: fdcefa87bdb00a951722acf6387d377a3793cfcf7f49d4fb5d1e57ca472ec4a6
                                                      • Instruction ID: 4f65e4923f490320b6789bd7ed6068fda02575438f033e39612c4b3af5ab9208
                                                      • Opcode Fuzzy Hash: fdcefa87bdb00a951722acf6387d377a3793cfcf7f49d4fb5d1e57ca472ec4a6
                                                      • Instruction Fuzzy Hash: 1311EB35609B72BAE7155B549C83DAA279F9F15310F30003FFA02A7781E770AA004A69
                                                      APIs
                                                      • SafeArrayGetVartype.OLEAUT32(?,00000000), ref: 0066A806
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ArraySafeVartype
                                                      • String ID:
                                                      • API String ID: 1725837607-0
                                                      • Opcode ID: 98c02a165b4f11cfb458f45eb33ece48a39c95c1a814a9b281e0e8bcf091cce0
                                                      • Instruction ID: a68c3b2dd28f4f55aa2c473550a3b13d7b2f5809ede7a2985a773240439efa68
                                                      • Opcode Fuzzy Hash: 98c02a165b4f11cfb458f45eb33ece48a39c95c1a814a9b281e0e8bcf091cce0
                                                      • Instruction Fuzzy Hash: 04C15775A0421A9FDB00DFD8C481BAEB7F6EF09315F20406AE606E7341D734AA42CFA5
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00666B63
                                                      • LoadStringW.USER32(00000000), ref: 00666B6A
                                                      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00666B80
                                                      • LoadStringW.USER32(00000000), ref: 00666B87
                                                      • _wprintf.LIBCMT ref: 00666BAD
                                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00666BCB
                                                      Strings
                                                      • %s (%d) : ==> %s: %s %s, xrefs: 00666BA8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadModuleString$Message_wprintf
                                                      • String ID: %s (%d) : ==> %s: %s %s
                                                      • API String ID: 3648134473-3128320259
                                                      • Opcode ID: e7b9e3f3f2c711abc952f65901267a5e20260a91d0695c5f7ec473a7509ea495
                                                      • Instruction ID: 7aa42d7146fa83220af6c0e853a999843a00bbc60ca5be3bd7dc02ae407c944d
                                                      • Opcode Fuzzy Hash: e7b9e3f3f2c711abc952f65901267a5e20260a91d0695c5f7ec473a7509ea495
                                                      • Instruction Fuzzy Hash: 800181F2900208BFEB11BBA4DD89EF7376DDB09304F0044A1B746E6141EA74AE848F70
                                                      APIs
                                                        • Part of subcall function 00683C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00682BB5,?,?), ref: 00683C1D
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00682BF6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: BuffCharConnectRegistryUpper
                                                      • String ID:
                                                      • API String ID: 2595220575-0
                                                      • Opcode ID: d7be4ad93ac9902b841c500b92e3c16bc809293385cfae6166d87ca30d0c45f0
                                                      • Instruction ID: 568186da8834bebbac179ee5bfbe83608deb0e70ec0c8411e82ec3196ca00b42
                                                      • Opcode Fuzzy Hash: d7be4ad93ac9902b841c500b92e3c16bc809293385cfae6166d87ca30d0c45f0
                                                      • Instruction Fuzzy Hash: F3916A712042129FCB40EF54C8A1B6EBBE6FF88314F04895DF996972A2DB34E945CF46
                                                      APIs
                                                      • select.WSOCK32 ref: 00679691
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 0067969E
                                                      • __WSAFDIsSet.WSOCK32(00000000,?,00000000), ref: 006796C8
                                                      • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 006796E9
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 006796F8
                                                      • htons.WSOCK32(?,?,?,00000000,?), ref: 006797AA
                                                      • inet_ntoa.WSOCK32(?,?,?,?,?,?,?,?,?,?,?,?,006BDC00), ref: 00679765
                                                        • Part of subcall function 0065D2FF: _strlen.LIBCMT ref: 0065D309
                                                      • _strlen.LIBCMT ref: 00679800
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast_strlen$htonsinet_ntoaselect
                                                      • String ID:
                                                      • API String ID: 3480843537-0
                                                      • Opcode ID: d7e7f32f66efc814e48b8041f77622aab14526016766e5cd47be2fec6173a8f0
                                                      • Instruction ID: 27b74ac8df34b857bcf7fba3496cfddd13449b3d31f15c8f1d47718d2df20cef
                                                      • Opcode Fuzzy Hash: d7e7f32f66efc814e48b8041f77622aab14526016766e5cd47be2fec6173a8f0
                                                      • Instruction Fuzzy Hash: C081E331504240ABC754EF64DC85EAFB7EAEF85710F108A1DF55A9B291EB30ED04CBA6
                                                      APIs
                                                      • __mtinitlocknum.LIBCMT ref: 0064A991
                                                        • Part of subcall function 00647D7C: __FF_MSGBANNER.LIBCMT ref: 00647D91
                                                        • Part of subcall function 00647D7C: __NMSG_WRITE.LIBCMT ref: 00647D98
                                                        • Part of subcall function 00647D7C: __malloc_crt.LIBCMT ref: 00647DB8
                                                      • __lock.LIBCMT ref: 0064A9A4
                                                      • __lock.LIBCMT ref: 0064A9F0
                                                      • InitializeCriticalSectionAndSpinCount.KERNEL32(8000000C,00000FA0,006D6DE0,00000018,00655E7B,?,00000000,00000109), ref: 0064AA0C
                                                      • EnterCriticalSection.KERNEL32(8000000C,006D6DE0,00000018,00655E7B,?,00000000,00000109), ref: 0064AA29
                                                      • LeaveCriticalSection.KERNEL32(8000000C), ref: 0064AA39
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$__lock$CountEnterInitializeLeaveSpin__malloc_crt__mtinitlocknum
                                                      • String ID:
                                                      • API String ID: 1422805418-0
                                                      • Opcode ID: 45d3e39d240f6343cd066965b1034c6ffb50c1655f7a22379cf8a8e80b12decf
                                                      • Instruction ID: ae88b7f6f2df1af99e766facc7bc04044ece9799091788fac596e9e9f7c7c45c
                                                      • Opcode Fuzzy Hash: 45d3e39d240f6343cd066965b1034c6ffb50c1655f7a22379cf8a8e80b12decf
                                                      • Instruction Fuzzy Hash: FE412871A40301BBEB10DFE8DA8479CB7A3AF05325F10821CE425AB2D2D7B49D81CB86
                                                      APIs
                                                      • DeleteObject.GDI32(00000000), ref: 00688EE4
                                                      • GetDC.USER32(00000000), ref: 00688EEC
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00688EF7
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00688F03
                                                      • CreateFontW.GDI32(?,00000000,00000000,00000000,00000000,?,?,?,00000001,00000004,00000000,?,00000000,?), ref: 00688F3F
                                                      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00688F50
                                                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0068BD19,?,?,000000FF,00000000,?,000000FF,?), ref: 00688F8A
                                                      • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00688FAA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                      • String ID:
                                                      • API String ID: 3864802216-0
                                                      • Opcode ID: 44434bc161efd85d249a45248f399cbf8b81192677b44aa508ff0434bf4cc363
                                                      • Instruction ID: 42c285313cb74172ecc389cfded8ee62acceaeaa6fc7c639ae2c33870a9cdf29
                                                      • Opcode Fuzzy Hash: 44434bc161efd85d249a45248f399cbf8b81192677b44aa508ff0434bf4cc363
                                                      • Instruction Fuzzy Hash: B3317F72200214BFEB109F50CC49FEB3BAEEF4A755F045165FE09DA291CA75A841CB74
                                                      APIs
                                                        • Part of subcall function 0063B34E: GetWindowLongW.USER32(?,000000EB), ref: 0063B35F
                                                      • GetSystemMetrics.USER32(0000000F), ref: 0069016D
                                                      • MoveWindow.USER32(00000003,?,00000000,00000001,00000000,00000000,?,?,?), ref: 0069038D
                                                      • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 006903AB
                                                      • InvalidateRect.USER32(?,00000000,00000001,?), ref: 006903D6
                                                      • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 006903FF
                                                      • ShowWindow.USER32(00000003,00000000), ref: 00690421
                                                      • DefDlgProcW.USER32(?,00000005,?,?), ref: 00690440
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSend$InvalidateLongMetricsMoveProcRectShowSystem
                                                      • String ID:
                                                      • API String ID: 3356174886-0
                                                      • Opcode ID: 551bc81035e63065584a8a2876d497a040bf89693615e19a03d69e49134c4d41
                                                      • Instruction ID: 8e5dea34e62a735482c34ff29afd0b1373e9fb84427dd1bb2d8ae75e247c8484
                                                      • Opcode Fuzzy Hash: 551bc81035e63065584a8a2876d497a040bf89693615e19a03d69e49134c4d41
                                                      • Instruction Fuzzy Hash: F2A18A35600616EFEF18CF68C9897FDBBBABF08700F088119E855AB690D734AD51DB90
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: da073f705e5f5651661fee89212170a625f5a2c82acb6f6fc88a2ae23ce12e40
                                                      • Instruction ID: 7428e45b26b6cc7d90780c306dfe499715c82d5bc991e15af3280761da693b63
                                                      • Opcode Fuzzy Hash: da073f705e5f5651661fee89212170a625f5a2c82acb6f6fc88a2ae23ce12e40
                                                      • Instruction Fuzzy Hash: 49716CB1900109EFCF14CF98CC89AEEBB7AFF85314F148149F955A6251C731AA42DFA5
                                                      APIs
                                                      • _memset.LIBCMT ref: 0068225A
                                                      • _memset.LIBCMT ref: 00682323
                                                      • ShellExecuteExW.SHELL32(?), ref: 00682368
                                                        • Part of subcall function 0062936C: __swprintf.LIBCMT ref: 006293AB
                                                        • Part of subcall function 0062936C: __itow.LIBCMT ref: 006293DF
                                                        • Part of subcall function 0063C6F4: _wcscpy.LIBCMT ref: 0063C717
                                                      • CloseHandle.KERNEL32(00000000), ref: 0068242F
                                                      • FreeLibrary.KERNEL32(00000000), ref: 0068243E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: _memset$CloseExecuteFreeHandleLibraryShell__itow__swprintf_wcscpy
                                                      • String ID: @
                                                      • API String ID: 4082843840-2766056989
                                                      • Opcode ID: 8f7423d97187738a60900870a80bfdb1f4b45815d6b3119a276b33c979324d5c
                                                      • Instruction ID: 5b3304c9eff9a87148446cf5f0b310a1f9385463c459a75e2191df79397fe398
                                                      • Opcode Fuzzy Hash: 8f7423d97187738a60900870a80bfdb1f4b45815d6b3119a276b33c979324d5c
                                                      • Instruction Fuzzy Hash: FC715E7490062A9FCF15EF94D4A199EB7F6FF48310F108559E856AB351CB34AE40CF98
                                                      APIs
                                                      • GetParent.USER32(00000000), ref: 00663C02
                                                      • GetKeyboardState.USER32(?), ref: 00663C17
                                                      • SetKeyboardState.USER32(?), ref: 00663C78
                                                      • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00663CA4
                                                      • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00663CC1
                                                      • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00663D05
                                                      • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00663D26
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessagePost$KeyboardState$Parent
                                                      • String ID:
                                                      • API String ID: 87235514-0
                                                      • Opcode ID: d436d5ae40eb42f72a5c306e56d9ae383061df3f28853161b37b8cf0fa9c1017
                                                      • Instruction ID: 6c10072c8ae512054ab4c7847a7b65379d2a4c8c3f604a301e2ef2f6ed1c405c
                                                      • Opcode Fuzzy Hash: d436d5ae40eb42f72a5c306e56d9ae383061df3f28853161b37b8cf0fa9c1017
                                                      • Instruction Fuzzy Hash: B151E5A09047E53DFB3287248C55BF6BFAAAF06304F08848CF1D556BC2D694EE84D760
                                                      APIs
                                                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00688FE7
                                                      • GetWindowLongW.USER32(00C80738,000000F0), ref: 0068901A
                                                      • GetWindowLongW.USER32(00C80738,000000F0), ref: 0068904F
                                                      • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00689081
                                                      • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 006890AB
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 006890BC
                                                      • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 006890D6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: LongWindow$MessageSend
                                                      • String ID:
                                                      • API String ID: 2178440468-0
                                                      • Opcode ID: 603d1f74729362a3f8ef27679b04a6b864971aee0f35e9d046bd5af25dd72fa1
                                                      • Instruction ID: 76a1ca5a37d7820cc690e3d94417ddec1581a8eb27760ac3cd2842d3338893f7
                                                      • Opcode Fuzzy Hash: 603d1f74729362a3f8ef27679b04a6b864971aee0f35e9d046bd5af25dd72fa1
                                                      • Instruction Fuzzy Hash: D1312474640215EFDB21AF58DC84FA437A6FB4A714F181268F61A8F2B1CBB1A840DF61
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006608F2
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00660918
                                                      • SysAllocString.OLEAUT32(00000000), ref: 0066091B
                                                      • SysAllocString.OLEAUT32(?), ref: 00660939
                                                      • SysFreeString.OLEAUT32(?), ref: 00660942
                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 00660967
                                                      • SysAllocString.OLEAUT32(?), ref: 00660975
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                      • String ID:
                                                      • API String ID: 3761583154-0
                                                      • Opcode ID: 4b96ceb195b233a54402722eabbe8179aeb97373921f870b9b99c7fc4153c0f6
                                                      • Instruction ID: 9664ee66962642ae3b2b2627589e6387099ae993d47fb39b7ceb3526bab9475b
                                                      • Opcode Fuzzy Hash: 4b96ceb195b233a54402722eabbe8179aeb97373921f870b9b99c7fc4153c0f6
                                                      • Instruction Fuzzy Hash: B8219576601219AFAB10AF68CC88DEB73EEEB09360B009235F915DB251D674FC458BA4
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: __wcsnicmp
                                                      • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                      • API String ID: 1038674560-2734436370
                                                      • Opcode ID: 992bba787ed07559aebaef950df79955031e6882c779ee7154f4e9ba44a7e4c2
                                                      • Instruction ID: 5af5232c889acbd12e83b632181a1ae0f078e0cc9997306ed93a966ee9af1f09
                                                      • Opcode Fuzzy Hash: 992bba787ed07559aebaef950df79955031e6882c779ee7154f4e9ba44a7e4c2
                                                      • Instruction Fuzzy Hash: 15213A72544A1367D330AB24DD22EFB73DBEF65310F504029F4479B141EA659992C399
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006609CB
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006609F1
                                                      • SysAllocString.OLEAUT32(00000000), ref: 006609F4
                                                      • SysAllocString.OLEAUT32 ref: 00660A15
                                                      • SysFreeString.OLEAUT32 ref: 00660A1E
                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 00660A38
                                                      • SysAllocString.OLEAUT32(?), ref: 00660A46
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                      • String ID:
                                                      • API String ID: 3761583154-0
                                                      • Opcode ID: 0d4a821319028933906714c232bd6e91899855c20d1e9390d3abcc61868f887d
                                                      • Instruction ID: 091f8d77a352d59bd0f5743fdcbda82c49f8623ae5e243cfd9217f52c91a4db1
                                                      • Opcode Fuzzy Hash: 0d4a821319028933906714c232bd6e91899855c20d1e9390d3abcc61868f887d
                                                      • Instruction Fuzzy Hash: EE213575604204BFAB10EBE8DC89DAB77EEEF093607548135F909CB261EA74EC418B54
                                                      APIs
                                                        • Part of subcall function 0063D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0063D1BA
                                                        • Part of subcall function 0063D17C: GetStockObject.GDI32(00000011), ref: 0063D1CE
                                                        • Part of subcall function 0063D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 0063D1D8
                                                      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 0068A32D
                                                      • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0068A33A
                                                      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0068A345
                                                      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 0068A354
                                                      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 0068A360
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CreateObjectStockWindow
                                                      • String ID: Msctls_Progress32
                                                      • API String ID: 1025951953-3636473452
                                                      • Opcode ID: 69e3ca74432be901d33994ff457c19b7ed0694ab5d29da92b7b46c7bdd7aac8c
                                                      • Instruction ID: fdbdf3b3ae88055edfee016487b4b797f9ed65a6453e1e82350a6efd65673dd4
                                                      • Opcode Fuzzy Hash: 69e3ca74432be901d33994ff457c19b7ed0694ab5d29da92b7b46c7bdd7aac8c
                                                      • Instruction Fuzzy Hash: 7B1193B1150219BFEF115FA0CC85EEB7F6EFF09798F014215BA04A6160C6729C21DBA4
                                                      APIs
                                                      • GetClientRect.USER32(?,?), ref: 0063CCF6
                                                      • GetWindowRect.USER32(?,?), ref: 0063CD37
                                                      • ScreenToClient.USER32(?,?), ref: 0063CD5F
                                                      • GetClientRect.USER32(?,?), ref: 0063CE8C
                                                      • GetWindowRect.USER32(?,?), ref: 0063CEA5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Rect$Client$Window$Screen
                                                      • String ID:
                                                      • API String ID: 1296646539-0
                                                      • Opcode ID: 5ac2baa790209f70878b83f276adf7b83470d598718fde168067fe51fbff7c9f
                                                      • Instruction ID: 353538471af86b8577d6d6c0c9c55bd6ba40056b7436959131c1e5fb3517f2d6
                                                      • Opcode Fuzzy Hash: 5ac2baa790209f70878b83f276adf7b83470d598718fde168067fe51fbff7c9f
                                                      • Instruction Fuzzy Hash: 25B14879A00249DBDF10CFA8C4807EEBBB2FF08310F149529EC59EB654DB31A951DBA4
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 00681C18
                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 00681C26
                                                      • __wsplitpath.LIBCMT ref: 00681C54
                                                        • Part of subcall function 00641DFC: __wsplitpath_helper.LIBCMT ref: 00641E3C
                                                      • _wcscat.LIBCMT ref: 00681C69
                                                      • Process32NextW.KERNEL32(00000000,?), ref: 00681CDF
                                                      • CloseHandle.KERNEL32(00000000,?,?,00000002,00000000), ref: 00681CF1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath__wsplitpath_helper_wcscat
                                                      • String ID:
                                                      • API String ID: 1380811348-0
                                                      • Opcode ID: 656a5fdc250c3017bdd266626c06c7617952baad45e65aaffd3a9c53c1e67ded
                                                      • Instruction ID: afe576b45bba455e93b7e16b721b850dacf67245684ace3c70d76c8af0a78549
                                                      • Opcode Fuzzy Hash: 656a5fdc250c3017bdd266626c06c7617952baad45e65aaffd3a9c53c1e67ded
                                                      • Instruction Fuzzy Hash: B6519EB11043009FD720EF24D881EABB7EDEF89754F004A1EF58A97251EB30EA05CB96
                                                      APIs
                                                        • Part of subcall function 00683C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00682BB5,?,?), ref: 00683C1D
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006830AF
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 006830EF
                                                      • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00683112
                                                      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0068313B
                                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0068317E
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0068318B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                      • String ID:
                                                      • API String ID: 3451389628-0
                                                      • Opcode ID: 9f8d98869b46da68f11fec7a9c3c7ebbb2d01bf1f9713691fab730d4ad12f11f
                                                      • Instruction ID: 0d2beaa8dafca427e965ec42fd44140d55e7938e12607002a864ccf07bc6a2a0
                                                      • Opcode Fuzzy Hash: 9f8d98869b46da68f11fec7a9c3c7ebbb2d01bf1f9713691fab730d4ad12f11f
                                                      • Instruction Fuzzy Hash: B7515831104210AFC744EF64C885EAEBBEAFF89714F044A1DF595872A1DB71EA05CF56
                                                      APIs
                                                      • GetMenu.USER32(?), ref: 00688540
                                                      • GetMenuItemCount.USER32(00000000), ref: 00688577
                                                      • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0068859F
                                                      • GetMenuItemID.USER32(?,?), ref: 0068860E
                                                      • GetSubMenu.USER32(?,?), ref: 0068861C
                                                      • PostMessageW.USER32(?,00000111,?,00000000), ref: 0068866D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Menu$Item$CountMessagePostString
                                                      • String ID:
                                                      • API String ID: 650687236-0
                                                      • Opcode ID: f6dec043af5a35767639493d07f5ec253978c60e60f01e6ccda5a92c7b88f53c
                                                      • Instruction ID: 2d58a69058c80f5f945c8f6236d8a5ecbe1c8d2f2a4e5efcc5c013724c7d2741
                                                      • Opcode Fuzzy Hash: f6dec043af5a35767639493d07f5ec253978c60e60f01e6ccda5a92c7b88f53c
                                                      • Instruction Fuzzy Hash: B9518B71E00625AFCB51EFA4C841AEEB7F6EF48310F104599E916BB351DB30AE418F95
                                                      APIs
                                                      • _memset.LIBCMT ref: 00664B10
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00664B5B
                                                      • IsMenu.USER32(00000000), ref: 00664B7B
                                                      • CreatePopupMenu.USER32 ref: 00664BAF
                                                      • GetMenuItemCount.USER32(000000FF), ref: 00664C0D
                                                      • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00664C3E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                      • String ID:
                                                      • API String ID: 3311875123-0
                                                      • Opcode ID: 1dc8f433bf4a37a7bc5764920242e9a76588426fe349d0dac16252ec41c61fdd
                                                      • Instruction ID: 477705b9b050608043c9db708151db3d5cc8a7400e33566d61c28d7adab89c5f
                                                      • Opcode Fuzzy Hash: 1dc8f433bf4a37a7bc5764920242e9a76588426fe349d0dac16252ec41c61fdd
                                                      • Instruction Fuzzy Hash: 3551FE70A02209EFCF25CF68C888BEEBBF6AF45318F148159E4259B391EB709D44CB51
                                                      APIs
                                                      • select.WSOCK32(00000000,00000001,00000000,00000000,?,000003E8,006BDC00), ref: 00678E7C
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00678E89
                                                      • __WSAFDIsSet.WSOCK32(00000000,00000001,00000000), ref: 00678EAD
                                                      • #16.WSOCK32(?,?,00000000,00000000), ref: 00678EC5
                                                      • _strlen.LIBCMT ref: 00678EF7
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00678F6A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_strlenselect
                                                      • String ID:
                                                      • API String ID: 2217125717-0
                                                      • Opcode ID: 405bc44b3e118090553274be1299b080e295526eab02cef92a1fcb809f7a685b
                                                      • Instruction ID: 2b53d5a0bae012429a7175e435184cbebcf703db0516080e5650a1a6d9603c59
                                                      • Opcode Fuzzy Hash: 405bc44b3e118090553274be1299b080e295526eab02cef92a1fcb809f7a685b
                                                      • Instruction Fuzzy Hash: 5C41AE71500204AFCB58EBA4DD89EEEB7BBAF48350F10825DF51A97291DF30AE40CB64
                                                      APIs
                                                        • Part of subcall function 0063B34E: GetWindowLongW.USER32(?,000000EB), ref: 0063B35F
                                                      • BeginPaint.USER32(?,?,?), ref: 0063AC2A
                                                      • GetWindowRect.USER32(?,?), ref: 0063AC8E
                                                      • ScreenToClient.USER32(?,?), ref: 0063ACAB
                                                      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0063ACBC
                                                      • EndPaint.USER32(?,?,?,?,?), ref: 0063AD06
                                                      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 0069E673
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: PaintWindow$BeginClientLongRectRectangleScreenViewport
                                                      • String ID:
                                                      • API String ID: 2592858361-0
                                                      • Opcode ID: ebacdbf333bbd0529e8599527c2091f9b31f372aaa35c0e3a9c1ba98e42fb8c5
                                                      • Instruction ID: 3d25c0f845e5d2091e46403fb2f16bfea2a81d04aab27c27c05561df73a216b8
                                                      • Opcode Fuzzy Hash: ebacdbf333bbd0529e8599527c2091f9b31f372aaa35c0e3a9c1ba98e42fb8c5
                                                      • Instruction Fuzzy Hash: 0B41B2701043009FC710DF64CC84FB67BEAEB5A720F14166DF9A58B2A1D731A945EBA2
                                                      APIs
                                                      • ShowWindow.USER32(006E1628,00000000,006E1628,00000000,00000000,006E1628,?,0069DC5D,00000000,?,00000000,00000000,00000000,?,0069DAD1,00000004), ref: 0068E40B
                                                      • EnableWindow.USER32(00000000,00000000), ref: 0068E42F
                                                      • ShowWindow.USER32(006E1628,00000000), ref: 0068E48F
                                                      • ShowWindow.USER32(00000000,00000004), ref: 0068E4A1
                                                      • EnableWindow.USER32(00000000,00000001), ref: 0068E4C5
                                                      • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0068E4E8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Window$Show$Enable$MessageSend
                                                      • String ID:
                                                      • API String ID: 642888154-0
                                                      • Opcode ID: 9df7b9ee3fa219420067c7502354be30e33f66623fd92ab94ae5b8f5661c077c
                                                      • Instruction ID: 8db79d3be072b72d4769000e4440133738216f65b5b5023ee3fe456db259a91b
                                                      • Opcode Fuzzy Hash: 9df7b9ee3fa219420067c7502354be30e33f66623fd92ab94ae5b8f5661c077c
                                                      • Instruction Fuzzy Hash: F7415034601141EFDB26EF24C499FD47BE2BF09304F5882A9EA5D8F6A2C772E845CB51
                                                      APIs
                                                      • InterlockedExchange.KERNEL32(?,000001F5), ref: 006698D1
                                                        • Part of subcall function 0063F4EA: std::exception::exception.LIBCMT ref: 0063F51E
                                                        • Part of subcall function 0063F4EA: __CxxThrowException@8.LIBCMT ref: 0063F533
                                                      • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00669908
                                                      • EnterCriticalSection.KERNEL32(?), ref: 00669924
                                                      • LeaveCriticalSection.KERNEL32(?), ref: 0066999E
                                                      • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 006699B3
                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 006699D2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrowstd::exception::exception
                                                      • String ID:
                                                      • API String ID: 2537439066-0
                                                      • Opcode ID: 6254faad9abdfab4e0d71202cabd74d303cbc7db191a445fc43729bf2699c662
                                                      • Instruction ID: 31cf342e2f0784cb8577bf5626a1e39aa5778dd0f6bb72b0096ef056f3b1c0fd
                                                      • Opcode Fuzzy Hash: 6254faad9abdfab4e0d71202cabd74d303cbc7db191a445fc43729bf2699c662
                                                      • Instruction Fuzzy Hash: 05318131900205EBDB50EF94DC85EAEB7BAFF45710F1480A9F905AB246D734EE10CBA4
                                                      APIs
                                                      • GetForegroundWindow.USER32(?,?,?,?,?,?,006777F4,?,?,00000000,00000001), ref: 00679B53
                                                        • Part of subcall function 00676544: GetWindowRect.USER32(?,?), ref: 00676557
                                                      • GetDesktopWindow.USER32 ref: 00679B7D
                                                      • GetWindowRect.USER32(00000000), ref: 00679B84
                                                      • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00679BB6
                                                        • Part of subcall function 00667A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00667AD0
                                                      • GetCursorPos.USER32(?), ref: 00679BE2
                                                      • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00679C44
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                      • String ID:
                                                      • API String ID: 4137160315-0
                                                      • Opcode ID: 0b1816838a1b32a20440e01a07f0e1ae104f2ec95aafc7a298a42a242bbafb83
                                                      • Instruction ID: 8dc2ba17fbf936b8390ead41a8dae9f117644dfd43b8894968a15e43131be572
                                                      • Opcode Fuzzy Hash: 0b1816838a1b32a20440e01a07f0e1ae104f2ec95aafc7a298a42a242bbafb83
                                                      • Instruction Fuzzy Hash: 8931D072504305ABD710EF54DC49F9BB7EAFF89314F00092AF589D7291DA71EA08CBA2
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 0065AFAE
                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 0065AFB5
                                                      • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 0065AFC4
                                                      • CloseHandle.KERNEL32(00000004), ref: 0065AFCF
                                                      • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0065AFFE
                                                      • DestroyEnvironmentBlock.USERENV(00000000), ref: 0065B012
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                      • String ID:
                                                      • API String ID: 1413079979-0
                                                      • Opcode ID: 1e0e11cb14bbd76799caa37ed3320e1e18c3300444021e6632b22d6b4a22a8a7
                                                      • Instruction ID: 8562553cfe3168b4d497ea221d04f9348d0c0dbd8c9ce3dcd98913a3a171db05
                                                      • Opcode Fuzzy Hash: 1e0e11cb14bbd76799caa37ed3320e1e18c3300444021e6632b22d6b4a22a8a7
                                                      • Instruction Fuzzy Hash: 582149B2100209AFDF029FA4DD09BEE7BAAAB45305F044115FE02A2261C376DD29EB61
                                                      APIs
                                                        • Part of subcall function 0063AF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 0063AFE3
                                                        • Part of subcall function 0063AF83: SelectObject.GDI32(?,00000000), ref: 0063AFF2
                                                        • Part of subcall function 0063AF83: BeginPath.GDI32(?), ref: 0063B009
                                                        • Part of subcall function 0063AF83: SelectObject.GDI32(?,00000000), ref: 0063B033
                                                      • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 0068EC20
                                                      • LineTo.GDI32(00000000,00000003,?), ref: 0068EC34
                                                      • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0068EC42
                                                      • LineTo.GDI32(00000000,00000000,?), ref: 0068EC52
                                                      • EndPath.GDI32(00000000), ref: 0068EC62
                                                      • StrokePath.GDI32(00000000), ref: 0068EC72
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                      • String ID:
                                                      • API String ID: 43455801-0
                                                      • Opcode ID: bbcd0f31d4ea46d79ed38b445903d2c93cc013b44eb515ddb3b155bf2f15063f
                                                      • Instruction ID: 18d300d29527f9052ba6b213a235ff6a2118256061d78398ab24a01d6b7f3d66
                                                      • Opcode Fuzzy Hash: bbcd0f31d4ea46d79ed38b445903d2c93cc013b44eb515ddb3b155bf2f15063f
                                                      • Instruction Fuzzy Hash: 7A111B7240014DBFEF02AF90DC88EEA7F6EEF09354F048116BE1989160D771AE55DBA0
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 0065E1C0
                                                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 0065E1D1
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0065E1D8
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 0065E1E0
                                                      • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0065E1F7
                                                      • MulDiv.KERNEL32(000009EC,?,?), ref: 0065E209
                                                        • Part of subcall function 00659AA3: RaiseException.KERNEL32(-C0000018,00000001,00000000,00000000,00659A05,00000000,00000000,?,00659DDB), ref: 0065A53A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CapsDevice$ExceptionRaiseRelease
                                                      • String ID:
                                                      • API String ID: 603618608-0
                                                      • Opcode ID: 26d4b42785beaf28bf48fc592ccdb26f863af864b5d9216f0073160bc4bd472c
                                                      • Instruction ID: f3a340edee6fc5feb9403313a42f411017c843076e808a7092235fcdcfb20fba
                                                      • Opcode Fuzzy Hash: 26d4b42785beaf28bf48fc592ccdb26f863af864b5d9216f0073160bc4bd472c
                                                      • Instruction Fuzzy Hash: BB018FB5A40614BFEF10AFA6CC45B5EBFBAEB49351F008066EE05A7390D6719D01CFA0
                                                      APIs
                                                      • __init_pointers.LIBCMT ref: 00647B47
                                                        • Part of subcall function 0064123A: __initp_misc_winsig.LIBCMT ref: 0064125E
                                                        • Part of subcall function 0064123A: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00647F51
                                                        • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00647F65
                                                        • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00647F78
                                                        • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00647F8B
                                                        • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00647F9E
                                                        • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00647FB1
                                                        • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00647FC4
                                                        • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00647FD7
                                                        • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00647FEA
                                                        • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00647FFD
                                                        • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00648010
                                                        • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00648023
                                                        • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00648036
                                                        • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00648049
                                                        • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 0064805C
                                                        • Part of subcall function 0064123A: GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 0064806F
                                                      • __mtinitlocks.LIBCMT ref: 00647B4C
                                                        • Part of subcall function 00647E23: InitializeCriticalSectionAndSpinCount.KERNEL32(006DAC68,00000FA0,?,?,00647B51,00645E77,006D6C70,00000014), ref: 00647E41
                                                      • __mtterm.LIBCMT ref: 00647B55
                                                        • Part of subcall function 00647BBD: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00647B5A,00645E77,006D6C70,00000014), ref: 00647D3F
                                                        • Part of subcall function 00647BBD: _free.LIBCMT ref: 00647D46
                                                        • Part of subcall function 00647BBD: DeleteCriticalSection.KERNEL32(006DAC68,?,?,00647B5A,00645E77,006D6C70,00000014), ref: 00647D68
                                                      • __calloc_crt.LIBCMT ref: 00647B7A
                                                      • GetCurrentThreadId.KERNEL32 ref: 00647BA3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$CriticalSection$Delete$CountCurrentHandleInitializeModuleSpinThread__calloc_crt__init_pointers__initp_misc_winsig__mtinitlocks__mtterm_free
                                                      • String ID:
                                                      • API String ID: 2942034483-0
                                                      • Opcode ID: eb17dfcd06cc90ff5ccea55afbb6bc93033b8ace7c79bb5c26cbbd254912d84a
                                                      • Instruction ID: ebbad292b1b2cbe816db4e6f7177dbecf192e0b9ac05b37364cac5fe0880067f
                                                      • Opcode Fuzzy Hash: eb17dfcd06cc90ff5ccea55afbb6bc93033b8ace7c79bb5c26cbbd254912d84a
                                                      • Instruction Fuzzy Hash: C1F0903251D31219E7A47F74BC46A8B2787DF02734B200BAEF964D55E2FF21984145A9
                                                      APIs
                                                      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 0062281D
                                                      • MapVirtualKeyW.USER32(00000010,00000000), ref: 00622825
                                                      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00622830
                                                      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 0062283B
                                                      • MapVirtualKeyW.USER32(00000011,00000000), ref: 00622843
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0062284B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Virtual
                                                      • String ID:
                                                      • API String ID: 4278518827-0
                                                      • Opcode ID: f775d17afa69e1e263c5f751d04d1adb0f023cd3be7502e4718c4ae01998a0c0
                                                      • Instruction ID: 6f3d3b254f384ae59b838ef55b26f64f3abf50771bf3d30c6584a67e31a1c214
                                                      • Opcode Fuzzy Hash: f775d17afa69e1e263c5f751d04d1adb0f023cd3be7502e4718c4ae01998a0c0
                                                      • Instruction Fuzzy Hash: 500144B0902B5ABDE3009F6A8C85A52FEA8FF19354F00411BA15C47A42C7B5A864CBE5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CriticalExchangeInterlockedSection$EnterLeaveObjectSingleTerminateThreadWait
                                                      • String ID:
                                                      • API String ID: 1423608774-0
                                                      • Opcode ID: b541005bb33ee226cc1cee5310a0f2f931f32b51d74032b2abaf0a6ef0715811
                                                      • Instruction ID: 32a2a3183d694b7c018ae2c92480d77570185d0d2eb9b9611da9890111ee698e
                                                      • Opcode Fuzzy Hash: b541005bb33ee226cc1cee5310a0f2f931f32b51d74032b2abaf0a6ef0715811
                                                      • Instruction Fuzzy Hash: E601A936101211ABD7152B94EC48EEB77AFFF89701704142DFA0396594DB74B900DF60
                                                      APIs
                                                      • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00667C07
                                                      • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00667C1D
                                                      • GetWindowThreadProcessId.USER32(?,?), ref: 00667C2C
                                                      • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00667C3B
                                                      • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00667C45
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00667C4C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                      • String ID:
                                                      • API String ID: 839392675-0
                                                      • Opcode ID: 367e2bfe8ec42159f5703d48497bfe36242408118fe01af83e88392f4bbd1d72
                                                      • Instruction ID: 7a46fbea8bfe481f39a55c2f0840aa49b386b70e367513da1c647074a94b38b3
                                                      • Opcode Fuzzy Hash: 367e2bfe8ec42159f5703d48497bfe36242408118fe01af83e88392f4bbd1d72
                                                      • Instruction Fuzzy Hash: 91F03A72241158BBE7216B529C0EEEF7BBDEFC7B15F041018FA0291591D7A06E41CAB5
                                                      APIs
                                                      • InterlockedExchange.KERNEL32(?,?), ref: 00669A33
                                                      • EnterCriticalSection.KERNEL32(?,?,?,?,00695DEE,?,?,?,?,?,0062ED63), ref: 00669A44
                                                      • TerminateThread.KERNEL32(?,000001F6,?,?,?,00695DEE,?,?,?,?,?,0062ED63), ref: 00669A51
                                                      • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00695DEE,?,?,?,?,?,0062ED63), ref: 00669A5E
                                                        • Part of subcall function 006693D1: CloseHandle.KERNEL32(?,?,00669A6B,?,?,?,00695DEE,?,?,?,?,?,0062ED63), ref: 006693DB
                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00669A71
                                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,00695DEE,?,?,?,?,?,0062ED63), ref: 00669A78
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                      • String ID:
                                                      • API String ID: 3495660284-0
                                                      • Opcode ID: 6b59e282a7158498f9a7f87f0072fec7fd17cd64ae0a5b94b314208c726f7631
                                                      • Instruction ID: 2456cbd6b3ec0909855d05314734f583082b140587f3947ed994e19fefc0a388
                                                      • Opcode Fuzzy Hash: 6b59e282a7158498f9a7f87f0072fec7fd17cd64ae0a5b94b314208c726f7631
                                                      • Instruction Fuzzy Hash: 92F0BE32141201ABD7112BA4EC88EEA376BFF86302B041025F603A59A8CB79AA00DF60
                                                      APIs
                                                        • Part of subcall function 0063F4EA: std::exception::exception.LIBCMT ref: 0063F51E
                                                        • Part of subcall function 0063F4EA: __CxxThrowException@8.LIBCMT ref: 0063F533
                                                      • __swprintf.LIBCMT ref: 00621EA6
                                                      Strings
                                                      • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00621D49
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Exception@8Throw__swprintfstd::exception::exception
                                                      • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                      • API String ID: 2125237772-557222456
                                                      • Opcode ID: 69828da9ce720ca72cc5f4f4c4f0ab1d71c00f5d9c2b0122c30e732617c75423
                                                      • Instruction ID: 80e7818247058ad2ac6e7083538ea7eef9ef15b725f87502923bc2037c0e533d
                                                      • Opcode Fuzzy Hash: 69828da9ce720ca72cc5f4f4c4f0ab1d71c00f5d9c2b0122c30e732617c75423
                                                      • Instruction Fuzzy Hash: B3919C71108621AFCB64EF24D895CAEB7EABF95710F01491DF8859B2A1DB30ED04CF96
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 0067B006
                                                      • CharUpperBuffW.USER32(?,?), ref: 0067B115
                                                      • VariantClear.OLEAUT32(?), ref: 0067B298
                                                        • Part of subcall function 00669DC5: VariantInit.OLEAUT32(00000000), ref: 00669E05
                                                        • Part of subcall function 00669DC5: VariantCopy.OLEAUT32(?,?), ref: 00669E0E
                                                        • Part of subcall function 00669DC5: VariantClear.OLEAUT32(?), ref: 00669E1A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                      • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                      • API String ID: 4237274167-1221869570
                                                      • Opcode ID: 25b433081be54217ba86c89686ffd10337282e91aebfb7297bd0c4910b5e3d33
                                                      • Instruction ID: a091105ea34733b471c7ea8288182086e9aa328c6ea32c6fcceab7d4be9aac84
                                                      • Opcode Fuzzy Hash: 25b433081be54217ba86c89686ffd10337282e91aebfb7297bd0c4910b5e3d33
                                                      • Instruction Fuzzy Hash: 3E918E706083019FCB50DF24D491AAEB7F6EF89714F04886DF89A9B362DB31E905CB52
                                                      APIs
                                                        • Part of subcall function 0063C6F4: _wcscpy.LIBCMT ref: 0063C717
                                                      • _memset.LIBCMT ref: 00665438
                                                      • GetMenuItemInfoW.USER32(?), ref: 00665467
                                                      • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00665513
                                                      • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0066553D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                      • String ID: 0
                                                      • API String ID: 4152858687-4108050209
                                                      • Opcode ID: 9b0931c5f5aca05ebdbd595b174e40dce540e44f729ecac99f7ba864c2d428e3
                                                      • Instruction ID: d26a91ebb1a6ae16686e4cfe9db565726cb875029b4e8462aeba9c7f1c18e2a4
                                                      • Opcode Fuzzy Hash: 9b0931c5f5aca05ebdbd595b174e40dce540e44f729ecac99f7ba864c2d428e3
                                                      • Instruction Fuzzy Hash: 1D510371604B019BD7549F28C8866ABB7EBAF86710F04062EF897D7291EB70CD448B92
                                                      APIs
                                                      • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0066027B
                                                      • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 006602B1
                                                      • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 006602C2
                                                      • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00660344
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$AddressCreateInstanceProc
                                                      • String ID: DllGetClassObject
                                                      • API String ID: 753597075-1075368562
                                                      • Opcode ID: bada436ac57bdcd9e5cdaa28f416506b4ce854ebdcf39f9666c126b2d5159e78
                                                      • Instruction ID: 9ab249ac6c8dee6f3d8564842db9cb66fff1cdecb190209b8c0d1135fa0b935c
                                                      • Opcode Fuzzy Hash: bada436ac57bdcd9e5cdaa28f416506b4ce854ebdcf39f9666c126b2d5159e78
                                                      • Instruction Fuzzy Hash: FC414A71600205EFEB15DF54C884B9B7BBAEF45315B1480ADE909AF306D7B1DE44CBA0
                                                      APIs
                                                      • _memset.LIBCMT ref: 00665075
                                                      • GetMenuItemInfoW.USER32 ref: 00665091
                                                      • DeleteMenu.USER32(00000004,00000007,00000000), ref: 006650D7
                                                      • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,006E1708,00000000), ref: 00665120
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Menu$Delete$InfoItem_memset
                                                      • String ID: 0
                                                      • API String ID: 1173514356-4108050209
                                                      • Opcode ID: 0a00e32ceb9ee45e2e5111aa4f3418b92c00986d7787f4774b02454821384e15
                                                      • Instruction ID: 109d1e35ed921f494e2f9bc715fad5584e7c76749ea3a701d6ca756b3b5cc8d5
                                                      • Opcode Fuzzy Hash: 0a00e32ceb9ee45e2e5111aa4f3418b92c00986d7787f4774b02454821384e15
                                                      • Instruction Fuzzy Hash: 9141C2712047019FD720DF24D886B6AF7E6EF8A324F144A1EF99697391D730E904CB66
                                                      APIs
                                                      • CharLowerBuffW.USER32(?,?,?,?), ref: 00680587
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: BuffCharLower
                                                      • String ID: cdecl$none$stdcall$winapi
                                                      • API String ID: 2358735015-567219261
                                                      • Opcode ID: 7e2af4b3c443e2730745aa68ac70626441627b0be754de36831b4254054a3219
                                                      • Instruction ID: 56999acf69b6933cd74ee26da070eb6e73d919259dc86d84128c7dfa20bf6ca2
                                                      • Opcode Fuzzy Hash: 7e2af4b3c443e2730745aa68ac70626441627b0be754de36831b4254054a3219
                                                      • Instruction Fuzzy Hash: 4431BE30900616AFDF40EF54C9419EEB3B6FF55314B008A2EE826A77D1EB71E959CB90
                                                      APIs
                                                      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 0065B88E
                                                      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 0065B8A1
                                                      • SendMessageW.USER32(?,00000189,?,00000000), ref: 0065B8D1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 3850602802-1403004172
                                                      • Opcode ID: 682f3ab5be3d2456a6d202fc83a47e7fc2494a88211e746790775b8bd07a0718
                                                      • Instruction ID: 3b81461086c5a6ca53b716c5aae6b4ea33aa9c0526584b447561060c0761442c
                                                      • Opcode Fuzzy Hash: 682f3ab5be3d2456a6d202fc83a47e7fc2494a88211e746790775b8bd07a0718
                                                      • Instruction Fuzzy Hash: F9212371900108BFDB44AB68D886DFE777EDF16361F10612DF822A72E1DB741D0A8B64
                                                      APIs
                                                      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00674401
                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00674427
                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00674457
                                                      • InternetCloseHandle.WININET(00000000), ref: 0067449E
                                                        • Part of subcall function 00675052: GetLastError.KERNEL32(?,?,006743CC,00000000,00000000,00000001), ref: 00675067
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: HttpInternet$CloseErrorHandleInfoLastOpenQueryRequestSend
                                                      • String ID:
                                                      • API String ID: 1951874230-3916222277
                                                      • Opcode ID: 83a57f22445db8ed72109152e0a2429ad8cb9afb47a1c69508a539bda4d4f073
                                                      • Instruction ID: 257e5e72c45e3be8652f5b3086ba097f65c256f5e73d5bf65233a171fd67a7dc
                                                      • Opcode Fuzzy Hash: 83a57f22445db8ed72109152e0a2429ad8cb9afb47a1c69508a539bda4d4f073
                                                      • Instruction Fuzzy Hash: 712180B1500208BEE711AF64CC89EFF76EEEB49754F10C01AF10A96240DF759D05A7B0
                                                      APIs
                                                        • Part of subcall function 0063D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0063D1BA
                                                        • Part of subcall function 0063D17C: GetStockObject.GDI32(00000011), ref: 0063D1CE
                                                        • Part of subcall function 0063D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 0063D1D8
                                                      • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 0068915C
                                                      • LoadLibraryW.KERNEL32(?), ref: 00689163
                                                      • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00689178
                                                      • DestroyWindow.USER32(?), ref: 00689180
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                      • String ID: SysAnimate32
                                                      • API String ID: 4146253029-1011021900
                                                      • Opcode ID: 445c8859ba1b048b38434858bd63ca3da648989d61316e3b0aa58b4500d9e8db
                                                      • Instruction ID: 72fbaecb83e18360910eedbb59c3fb4a0f245141e42dc79963524831b55ecee9
                                                      • Opcode Fuzzy Hash: 445c8859ba1b048b38434858bd63ca3da648989d61316e3b0aa58b4500d9e8db
                                                      • Instruction Fuzzy Hash: 9C21C271204206BBEF106E64DC88EFA37AFEF96364F181318F991A2290C771DC42A770
                                                      APIs
                                                      • GetStdHandle.KERNEL32(0000000C), ref: 00669588
                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 006695B9
                                                      • GetStdHandle.KERNEL32(0000000C), ref: 006695CB
                                                      • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00669605
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CreateHandle$FilePipe
                                                      • String ID: nul
                                                      • API String ID: 4209266947-2873401336
                                                      • Opcode ID: a9bb12c21a555aa947f0aef034e7bbb58cb4e52f51fc8d1f685ee9f0e41d9c02
                                                      • Instruction ID: 99e7cc3404b4275b4d565073c4214282af02aaaafacaa46ee6bb8b5665b825b6
                                                      • Opcode Fuzzy Hash: a9bb12c21a555aa947f0aef034e7bbb58cb4e52f51fc8d1f685ee9f0e41d9c02
                                                      • Instruction Fuzzy Hash: 2C215170600205ABDB219F25DC05ADA77EEAF85720F204A19FDA2D73D0D770E945CB30
                                                      APIs
                                                      • GetStdHandle.KERNEL32(000000F6), ref: 00669653
                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00669683
                                                      • GetStdHandle.KERNEL32(000000F6), ref: 00669694
                                                      • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 006696CE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CreateHandle$FilePipe
                                                      • String ID: nul
                                                      • API String ID: 4209266947-2873401336
                                                      • Opcode ID: 1581f1df1456957b88ba414ce0b46a8b4ca00ad4cbf7918ce189e7c2a74bd39f
                                                      • Instruction ID: 6684d62094f6545c8f45f6612ebc43690830fc69b19466f646a74caa3543034c
                                                      • Opcode Fuzzy Hash: 1581f1df1456957b88ba414ce0b46a8b4ca00ad4cbf7918ce189e7c2a74bd39f
                                                      • Instruction Fuzzy Hash: 43216D716003059BEB209F6ADC44EDA77EEAF45720F200A19FDA1E73D0EB70A945CB65
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 0066DB0A
                                                      • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0066DB5E
                                                      • __swprintf.LIBCMT ref: 0066DB77
                                                      • SetErrorMode.KERNEL32(00000000,00000001,00000000,006BDC00), ref: 0066DBB5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$InformationVolume__swprintf
                                                      • String ID: %lu
                                                      • API String ID: 3164766367-685833217
                                                      • Opcode ID: da67573d89774dc801671f102ed2458964406babf1f5a32248bb59a1cbbeb039
                                                      • Instruction ID: 2159c9e136166f2d26772cc32fb64647eb914a79b0917414437db33659d4ed57
                                                      • Opcode Fuzzy Hash: da67573d89774dc801671f102ed2458964406babf1f5a32248bb59a1cbbeb039
                                                      • Instruction Fuzzy Hash: B2218375A00108AFCB50EF64D985DEEBBBAEF49714B004069F505DB251DB70EA41CF65
                                                      APIs
                                                        • Part of subcall function 0065C82D: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0065C84A
                                                        • Part of subcall function 0065C82D: GetWindowThreadProcessId.USER32(?,00000000), ref: 0065C85D
                                                        • Part of subcall function 0065C82D: GetCurrentThreadId.KERNEL32 ref: 0065C864
                                                        • Part of subcall function 0065C82D: AttachThreadInput.USER32(00000000), ref: 0065C86B
                                                      • GetFocus.USER32 ref: 0065CA05
                                                        • Part of subcall function 0065C876: GetParent.USER32(?), ref: 0065C884
                                                      • GetClassNameW.USER32(?,?,00000100), ref: 0065CA4E
                                                      • EnumChildWindows.USER32(?,0065CAC4), ref: 0065CA76
                                                      • __swprintf.LIBCMT ref: 0065CA90
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf
                                                      • String ID: %s%d
                                                      • API String ID: 3187004680-1110647743
                                                      • Opcode ID: a9318bc356426b188b59e68732b4f0c6b17fd71c03a4e6383949178d9358a4fb
                                                      • Instruction ID: a1b4103fa706212590df24983d108ae8185ae020c6f3652ae4f7f30a5ef82c4e
                                                      • Opcode Fuzzy Hash: a9318bc356426b188b59e68732b4f0c6b17fd71c03a4e6383949178d9358a4fb
                                                      • Instruction Fuzzy Hash: EE11E1B16003097BCF41BFA0DC85FE93B6EAF44725F00806AFE08AA182CB709549CB74
                                                      APIs
                                                      • __lock.LIBCMT ref: 00647AD8
                                                        • Part of subcall function 00647CF4: __mtinitlocknum.LIBCMT ref: 00647D06
                                                        • Part of subcall function 00647CF4: EnterCriticalSection.KERNEL32(00000000,?,00647ADD,0000000D), ref: 00647D1F
                                                      • InterlockedIncrement.KERNEL32(?), ref: 00647AE5
                                                      • __lock.LIBCMT ref: 00647AF9
                                                      • ___addlocaleref.LIBCMT ref: 00647B17
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: __lock$CriticalEnterIncrementInterlockedSection___addlocaleref__mtinitlocknum
                                                      • String ID: `j
                                                      • API String ID: 1687444384-3808571552
                                                      • Opcode ID: 83fc2610b7628ac71339fd2ef52c859d103d7b022798c9b4a6cdf77d5bbceddf
                                                      • Instruction ID: ba098d806d09e72d992dddd56e1b4ed784dea62705c7dabf32aec509ec8a2f9c
                                                      • Opcode Fuzzy Hash: 83fc2610b7628ac71339fd2ef52c859d103d7b022798c9b4a6cdf77d5bbceddf
                                                      • Instruction Fuzzy Hash: 0B016D71404B00DFD760EF75D90574ABBF2EF51321F20890EE49A976A0CBB0A680CB45
                                                      APIs
                                                      • _memset.LIBCMT ref: 0068E33D
                                                      • _memset.LIBCMT ref: 0068E34C
                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,006E3D00,006E3D44), ref: 0068E37B
                                                      • CloseHandle.KERNEL32 ref: 0068E38D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: _memset$CloseCreateHandleProcess
                                                      • String ID: D=n
                                                      • API String ID: 3277943733-1211169007
                                                      • Opcode ID: c2499469cc380de31830905f49686e6d8486ff13d68762e45091fbf49154a582
                                                      • Instruction ID: 460ee0e26adf17a6bff0c29ada93da6953ccc851e3ce6cc6e1bbea7ea21398aa
                                                      • Opcode Fuzzy Hash: c2499469cc380de31830905f49686e6d8486ff13d68762e45091fbf49154a582
                                                      • Instruction Fuzzy Hash: F9F05EF1540364BAF3102B61AC89F777E5FDF05754F005421BF09DB2A2D7759E108AA8
                                                      APIs
                                                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 006819F3
                                                      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00681A26
                                                      • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00681B49
                                                      • CloseHandle.KERNEL32(?), ref: 00681BBF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                      • String ID:
                                                      • API String ID: 2364364464-0
                                                      • Opcode ID: f367b668e9bac8bd2345b032b5ebd98e878058b2256a849f403facb74e704bcc
                                                      • Instruction ID: 88bcd6e4c4e461635c86783798b1ccfdea3a015f527f28bfd98b19d9ec889756
                                                      • Opcode Fuzzy Hash: f367b668e9bac8bd2345b032b5ebd98e878058b2256a849f403facb74e704bcc
                                                      • Instruction Fuzzy Hash: F8819070600215ABDF50AF64C896BADBBEAFF09720F148459F905AF382D7B4AD41CF94
                                                      APIs
                                                      • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0068E1D5
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 0068E20D
                                                      • IsDlgButtonChecked.USER32(?,00000001), ref: 0068E248
                                                      • GetWindowLongW.USER32(?,000000EC), ref: 0068E269
                                                      • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0068E281
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$ButtonCheckedLongWindow
                                                      • String ID:
                                                      • API String ID: 3188977179-0
                                                      • Opcode ID: 89a057afd116daa9f7ed435255c7a05204d781c17222d19ea6c849e6e19321d3
                                                      • Instruction ID: 90b6e846cee79c37f68937d1e5d556a0adf06e5f519ccc7968c4268072cf9009
                                                      • Opcode Fuzzy Hash: 89a057afd116daa9f7ed435255c7a05204d781c17222d19ea6c849e6e19321d3
                                                      • Instruction Fuzzy Hash: C661A434A00644AFDB24EF54C895FEA77BBEF8A300F144659F9999B3A1C772A950CB10
                                                      APIs
                                                        • Part of subcall function 0062936C: __swprintf.LIBCMT ref: 006293AB
                                                        • Part of subcall function 0062936C: __itow.LIBCMT ref: 006293DF
                                                      • LoadLibraryW.KERNEL32(?,00000004,?,?), ref: 006806EE
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 0068077D
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 0068079B
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 006807E1
                                                      • FreeLibrary.KERNEL32(00000000,00000004), ref: 006807FB
                                                        • Part of subcall function 0063E65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,0066A574,?,?,00000000,00000008), ref: 0063E675
                                                        • Part of subcall function 0063E65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,0066A574,?,?,00000000,00000008), ref: 0063E699
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                      • String ID:
                                                      • API String ID: 327935632-0
                                                      • Opcode ID: fc308059ec266aa19afd9fbbecab05f3afcdba14d9cc7b3fd398b6116e59a650
                                                      • Instruction ID: 8b46e89eabf0d1205c4f88ddf0af7577ee413e1077aab2e17fc27b20f871e828
                                                      • Opcode Fuzzy Hash: fc308059ec266aa19afd9fbbecab05f3afcdba14d9cc7b3fd398b6116e59a650
                                                      • Instruction Fuzzy Hash: 95516775A00615DFDB40EFA8C8819EDB7B6BF49310B048159EA16AB352DB30ED46CF94
                                                      APIs
                                                        • Part of subcall function 00683C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00682BB5,?,?), ref: 00683C1D
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00682EEF
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00682F2E
                                                      • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00682F75
                                                      • RegCloseKey.ADVAPI32(?,?), ref: 00682FA1
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00682FAE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Close$BuffCharConnectEnumOpenRegistryUpper
                                                      • String ID:
                                                      • API String ID: 3740051246-0
                                                      • Opcode ID: 5d909fc4da2516c6c6be7b8fc5bf1fcdf01982f4edccdf57d10ec460e6a49f74
                                                      • Instruction ID: b94e40f0bb1061d2db25e2d3631780a4167ff027e2264885e6e550800487f8b5
                                                      • Opcode Fuzzy Hash: 5d909fc4da2516c6c6be7b8fc5bf1fcdf01982f4edccdf57d10ec460e6a49f74
                                                      • Instruction Fuzzy Hash: EC515871208205AFC744EF64C891EAEB7FABF88314F00891DF696972A1DB30E905CF56
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 78a7f161333f0a7bb903b8466b6294e79e261f77c3fe3cbb444fff5899ed2449
                                                      • Instruction ID: ec377f71f8d1305b4bc712ab4b5dcaaf3a6e86e62fca6f967e46928de84c75f7
                                                      • Opcode Fuzzy Hash: 78a7f161333f0a7bb903b8466b6294e79e261f77c3fe3cbb444fff5899ed2449
                                                      • Instruction Fuzzy Hash: 5D41A439900214AFC710FB68CC48FE97F66EF0A320F141365F95AA72D1C670AD41DB60
                                                      APIs
                                                      • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 006712B4
                                                      • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 006712DD
                                                      • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0067131C
                                                        • Part of subcall function 0062936C: __swprintf.LIBCMT ref: 006293AB
                                                        • Part of subcall function 0062936C: __itow.LIBCMT ref: 006293DF
                                                      • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00671341
                                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00671349
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                      • String ID:
                                                      • API String ID: 1389676194-0
                                                      • Opcode ID: ec34c3093845f7b2f95b8eca51c5bb43c294af44eb529a5b6fd5ec6b3fd1e832
                                                      • Instruction ID: f40e06c71ed0966dbd3990f8a12881a8ddd4fd9bf4a2d0271cd3348a4144948b
                                                      • Opcode Fuzzy Hash: ec34c3093845f7b2f95b8eca51c5bb43c294af44eb529a5b6fd5ec6b3fd1e832
                                                      • Instruction Fuzzy Hash: A1410B35A00515DFCB41EF64C981AADBBF6FF49310B148099E90AAB362CB31ED41DF64
                                                      APIs
                                                      • GetCursorPos.USER32(000000FF), ref: 0063B64F
                                                      • ScreenToClient.USER32(00000000,000000FF), ref: 0063B66C
                                                      • GetAsyncKeyState.USER32(00000001), ref: 0063B691
                                                      • GetAsyncKeyState.USER32(00000002), ref: 0063B69F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: AsyncState$ClientCursorScreen
                                                      • String ID:
                                                      • API String ID: 4210589936-0
                                                      • Opcode ID: 0ccef1cfba7007f88829d18ad5b7971e06d3e7f2d4ed2d79439772097f99f965
                                                      • Instruction ID: 966e598d9502c92998e8e5327a63f5ce7a89a924ba70639ffa11a0058e3cf018
                                                      • Opcode Fuzzy Hash: 0ccef1cfba7007f88829d18ad5b7971e06d3e7f2d4ed2d79439772097f99f965
                                                      • Instruction Fuzzy Hash: 1C417F35A04119FFCF159F64C845AEDBBB6FB06324F104329F82A96291CB30AD94DFA1
                                                      APIs
                                                      • GetWindowRect.USER32(?,?), ref: 0065B369
                                                      • PostMessageW.USER32(?,00000201,00000001), ref: 0065B413
                                                      • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 0065B41B
                                                      • PostMessageW.USER32(?,00000202,00000000), ref: 0065B429
                                                      • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 0065B431
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessagePostSleep$RectWindow
                                                      • String ID:
                                                      • API String ID: 3382505437-0
                                                      • Opcode ID: 4ba1fa680bba092a869d1950eec03a0997ea3ed7e0869b3b4af646c81e4fee0c
                                                      • Instruction ID: 425af2e33369c235c9589dd2deecf0f3e7734d8512e00be798b4fd87fd20f7a5
                                                      • Opcode Fuzzy Hash: 4ba1fa680bba092a869d1950eec03a0997ea3ed7e0869b3b4af646c81e4fee0c
                                                      • Instruction Fuzzy Hash: 8F31AE71900219EBDF14DF68D94DADE7BB6EB05316F105229F921AA2D1C3B0AD58CF90
                                                      APIs
                                                      • IsWindowVisible.USER32(?), ref: 0065DBD7
                                                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0065DBF4
                                                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0065DC2C
                                                      • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0065DC52
                                                      • _wcsstr.LIBCMT ref: 0065DC5C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                      • String ID:
                                                      • API String ID: 3902887630-0
                                                      • Opcode ID: 3039982811f3896f0d06eb2b11bd30816fcc7ad05779812c49682438fd70a35e
                                                      • Instruction ID: a5c0d879a9aa2db994326f2410750f9af2ba108a374c0565e58fa72301b31b3c
                                                      • Opcode Fuzzy Hash: 3039982811f3896f0d06eb2b11bd30816fcc7ad05779812c49682438fd70a35e
                                                      • Instruction Fuzzy Hash: 14210771204100BBEB259F399C49EBF7BAEDF46761F10403DFC0ACA191EAA1DC45D6A4
                                                      APIs
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0065BC90
                                                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0065BCC2
                                                      • __itow.LIBCMT ref: 0065BCDA
                                                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0065BD00
                                                      • __itow.LIBCMT ref: 0065BD11
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$__itow
                                                      • String ID:
                                                      • API String ID: 3379773720-0
                                                      • Opcode ID: 82f3d0f7a01a03c0b76b647727a7bcfd908bcd7d4c247a140ba561461b9ba0a3
                                                      • Instruction ID: 70a1f0b2add5b2ddfbeac3c2ec17aeee2c5829852176c04999426bd13d517ecf
                                                      • Opcode Fuzzy Hash: 82f3d0f7a01a03c0b76b647727a7bcfd908bcd7d4c247a140ba561461b9ba0a3
                                                      • Instruction Fuzzy Hash: 4F210B716006187BDB10AF649C46FDE7B7BEF4A351F002029FD06EB181DB70894987A5
                                                      APIs
                                                        • Part of subcall function 006250E6: _wcsncpy.LIBCMT ref: 006250FA
                                                      • GetFileAttributesW.KERNEL32(?,?,?,?,006660C3), ref: 00666369
                                                      • GetLastError.KERNEL32(?,?,?,006660C3), ref: 00666374
                                                      • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,006660C3), ref: 00666388
                                                      • _wcsrchr.LIBCMT ref: 006663AA
                                                        • Part of subcall function 00666318: CreateDirectoryW.KERNEL32(?,00000000,?,?,?,006660C3), ref: 006663E0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CreateDirectory$AttributesErrorFileLast_wcsncpy_wcsrchr
                                                      • String ID:
                                                      • API String ID: 3633006590-0
                                                      • Opcode ID: b906a26608d4237478034cab2d3d2fedf04826bb1f9248ef9a00182d77d55f67
                                                      • Instruction ID: 9e9be6b75046bf07412f374ebc39f9a8c53adf56bb11c9937f7a06f803f56b78
                                                      • Opcode Fuzzy Hash: b906a26608d4237478034cab2d3d2fedf04826bb1f9248ef9a00182d77d55f67
                                                      • Instruction Fuzzy Hash: 902108319042159BDB11AB74FC52FEA33AEEF163A0F102069F006E73C0EF60DD818A59
                                                      APIs
                                                        • Part of subcall function 0067A82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 0067A84E
                                                      • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00678BD3
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00678BE2
                                                      • connect.WSOCK32(00000000,?,00000010), ref: 00678BFE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastconnectinet_addrsocket
                                                      • String ID:
                                                      • API String ID: 3701255441-0
                                                      • Opcode ID: 041a5ec2282e2898c14f509e823a5c1a49f62d7bd495328c82952c5d9bcb4584
                                                      • Instruction ID: 132ba53bd3e99767168cc03a379e1765583dbb85cca12dce4cb5004e148aa448
                                                      • Opcode Fuzzy Hash: 041a5ec2282e2898c14f509e823a5c1a49f62d7bd495328c82952c5d9bcb4584
                                                      • Instruction Fuzzy Hash: 3621AE312002149FCB54AF68C989B7E77AAAF49720F04944DF946AB392CB74EC018B65
                                                      APIs
                                                      • IsWindow.USER32(00000000), ref: 00678441
                                                      • GetForegroundWindow.USER32 ref: 00678458
                                                      • GetDC.USER32(00000000), ref: 00678494
                                                      • GetPixel.GDI32(00000000,?,00000003), ref: 006784A0
                                                      • ReleaseDC.USER32(00000000,00000003), ref: 006784DB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Window$ForegroundPixelRelease
                                                      • String ID:
                                                      • API String ID: 4156661090-0
                                                      • Opcode ID: e08d20425cbd62bceb847a441d71b4889c4c826041b2782d93d288477335eca6
                                                      • Instruction ID: be76b59a480575bc7f81b7238a3aa23cb6d3000b8e351cb4b3800a0fad110056
                                                      • Opcode Fuzzy Hash: e08d20425cbd62bceb847a441d71b4889c4c826041b2782d93d288477335eca6
                                                      • Instruction Fuzzy Hash: EC219F75A00204AFD740EFA4D888AAEBBE6EF49341F04C47DF84AD7651CA70BD40CB60
                                                      APIs
                                                      • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 0063AFE3
                                                      • SelectObject.GDI32(?,00000000), ref: 0063AFF2
                                                      • BeginPath.GDI32(?), ref: 0063B009
                                                      • SelectObject.GDI32(?,00000000), ref: 0063B033
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ObjectSelect$BeginCreatePath
                                                      • String ID:
                                                      • API String ID: 3225163088-0
                                                      • Opcode ID: 08558908f1b57deeb778f9dca338e62dab276f52a789a13cea27d0902b69c676
                                                      • Instruction ID: 960d9e0672fe34973a4a6436bdac04aae1d9a059342366afc97de0415f128b8e
                                                      • Opcode Fuzzy Hash: 08558908f1b57deeb778f9dca338e62dab276f52a789a13cea27d0902b69c676
                                                      • Instruction Fuzzy Hash: C0218370800385EFDB10EF55EC84BDE7B6BBB12355F18631AE5259E2A0C3705A51EF91
                                                      APIs
                                                      • __calloc_crt.LIBCMT ref: 006421A9
                                                      • CreateThread.KERNEL32(?,?,006422DF,00000000,?,?), ref: 006421ED
                                                      • GetLastError.KERNEL32 ref: 006421F7
                                                      • _free.LIBCMT ref: 00642200
                                                      • __dosmaperr.LIBCMT ref: 0064220B
                                                        • Part of subcall function 00647C0E: __getptd_noexit.LIBCMT ref: 00647C0E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CreateErrorLastThread__calloc_crt__dosmaperr__getptd_noexit_free
                                                      • String ID:
                                                      • API String ID: 2664167353-0
                                                      • Opcode ID: d37fbad8c1619ded0ce1133ed5db99d3912c3b6020e265bfec595c41321d0fd5
                                                      • Instruction ID: 089a87f4c22df7a75540855fa179224a7dcb47b21ce383acc942ce1480a0ef07
                                                      • Opcode Fuzzy Hash: d37fbad8c1619ded0ce1133ed5db99d3912c3b6020e265bfec595c41321d0fd5
                                                      • Instruction Fuzzy Hash: 11110432104347AF9B11AFA4DC41DAB7B9BEF02770B20042DFA1487291EBB2D8418AA5
                                                      APIs
                                                      • GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 0065ABD7
                                                      • GetLastError.KERNEL32(?,0065A69F,?,?,?), ref: 0065ABE1
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,0065A69F,?,?,?), ref: 0065ABF0
                                                      • HeapAlloc.KERNEL32(00000000,?,0065A69F,?,?,?), ref: 0065ABF7
                                                      • GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 0065AC0E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 842720411-0
                                                      • Opcode ID: 179601bacc9a57ec6e8b4337d6f036871aca26bf419a4b12ec48a70f1e33ae7d
                                                      • Instruction ID: 79ef5e81c37a8209f9d8609a1a3e0342c4ccff25d6ac00af01407e3a661e9ea6
                                                      • Opcode Fuzzy Hash: 179601bacc9a57ec6e8b4337d6f036871aca26bf419a4b12ec48a70f1e33ae7d
                                                      • Instruction Fuzzy Hash: FE013C71200204BFDB105FA9DC48DAB3BAEEF8A755B101529F946C3260DA71EC44CF61
                                                      APIs
                                                      • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00667A74
                                                      • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00667A82
                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00667A8A
                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00667A94
                                                      • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00667AD0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: PerformanceQuery$CounterSleep$Frequency
                                                      • String ID:
                                                      • API String ID: 2833360925-0
                                                      • Opcode ID: 84a5de91d0f27d6d6278b8aa98be7bb0ebd1bd23aeb97497ccaa8efb213e5d27
                                                      • Instruction ID: eb73d7cc350fe01ec713a94878e43f6e417f747fa8a5bc05ec6ef9151a0c80ae
                                                      • Opcode Fuzzy Hash: 84a5de91d0f27d6d6278b8aa98be7bb0ebd1bd23aeb97497ccaa8efb213e5d27
                                                      • Instruction Fuzzy Hash: A0014C71C04619EBCF00AFE5DC48ADDBB7AFF09715F000495E902B2250DB30AA55CBA5
                                                      APIs
                                                      • CLSIDFromProgID.OLE32 ref: 00659ADC
                                                      • ProgIDFromCLSID.OLE32(?,00000000), ref: 00659AF7
                                                      • lstrcmpiW.KERNEL32(?,00000000), ref: 00659B05
                                                      • CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00659B15
                                                      • CLSIDFromString.OLE32(?,?), ref: 00659B21
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: From$Prog$FreeStringTasklstrcmpi
                                                      • String ID:
                                                      • API String ID: 3897988419-0
                                                      • Opcode ID: b07580e8af0a4385eb7d01889286373d25ba653878ac3ac4cc15db702669af0b
                                                      • Instruction ID: 605282afe27ea99ecf25610b15a15e4f603d6097efdc77c7d66b8c6f76b4cbc5
                                                      • Opcode Fuzzy Hash: b07580e8af0a4385eb7d01889286373d25ba653878ac3ac4cc15db702669af0b
                                                      • Instruction Fuzzy Hash: 7F014B76600219FFEB115F68ED44BAABBEEEB46752F148024FD06D2210D774ED489BB0
                                                      APIs
                                                      • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 0065AA79
                                                      • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 0065AA83
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 0065AA92
                                                      • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 0065AA99
                                                      • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0065AAAF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 44706859-0
                                                      • Opcode ID: 9b36b6533faba7bfd6a5d4d7447fb16218b5fff4822f8be2847e9f9b087b6eea
                                                      • Instruction ID: 2d2e63ff2882ef3a9bf2f9258f41e5a751817c327cf577d470dffdc67170305c
                                                      • Opcode Fuzzy Hash: 9b36b6533faba7bfd6a5d4d7447fb16218b5fff4822f8be2847e9f9b087b6eea
                                                      • Instruction Fuzzy Hash: 07F04F712402087FEB116FA4EC89EAB3BAEFF4A755F000619F942C7290DB60AC45CE61
                                                      APIs
                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0065AADA
                                                      • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0065AAE4
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0065AAF3
                                                      • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0065AAFA
                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0065AB10
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 44706859-0
                                                      • Opcode ID: e82ca7b0dca7481e13bc95795c38ac7d250f968e829874842d6e0fe6f693d948
                                                      • Instruction ID: 844076cf31c7c6c9e8cfe214f5793a4f040d2b022c6c5a6ae7b793eab67aa4d4
                                                      • Opcode Fuzzy Hash: e82ca7b0dca7481e13bc95795c38ac7d250f968e829874842d6e0fe6f693d948
                                                      • Instruction Fuzzy Hash: 04F04F712402087FEB111FA4EC88EBB3B6EFF46755F000129F942C7290DA60AC058EB1
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003E9), ref: 0065EC94
                                                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 0065ECAB
                                                      • MessageBeep.USER32(00000000), ref: 0065ECC3
                                                      • KillTimer.USER32(?,0000040A), ref: 0065ECDF
                                                      • EndDialog.USER32(?,00000001), ref: 0065ECF9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                      • String ID:
                                                      • API String ID: 3741023627-0
                                                      • Opcode ID: fa8a8d54269bcab448bc41ddd9befadbec7c9401e36ee351a4212c154fa9491b
                                                      • Instruction ID: e08c45d8b2497805585be7045fce197e2ec2e1b3bcf90affcc39fc169bfc4546
                                                      • Opcode Fuzzy Hash: fa8a8d54269bcab448bc41ddd9befadbec7c9401e36ee351a4212c154fa9491b
                                                      • Instruction Fuzzy Hash: 14016D30900715ABEF296B10DE4EB9677BABF01706F005559B9A7A18E0DBF5AA488F40
                                                      APIs
                                                      • EndPath.GDI32(?), ref: 0063B0BA
                                                      • StrokeAndFillPath.GDI32(?,?,0069E680,00000000,?,?,?), ref: 0063B0D6
                                                      • SelectObject.GDI32(?,00000000), ref: 0063B0E9
                                                      • DeleteObject.GDI32 ref: 0063B0FC
                                                      • StrokePath.GDI32(?), ref: 0063B117
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Path$ObjectStroke$DeleteFillSelect
                                                      • String ID:
                                                      • API String ID: 2625713937-0
                                                      • Opcode ID: 3f9bd7a2e8c92c025c7cafd337a7c154ad57d8982b716a07540ad9bed70985a9
                                                      • Instruction ID: d7ce7aafb1b9448172be6b4aa0ff5d3052e6972a046d9364a332b69fd92fd172
                                                      • Opcode Fuzzy Hash: 3f9bd7a2e8c92c025c7cafd337a7c154ad57d8982b716a07540ad9bed70985a9
                                                      • Instruction Fuzzy Hash: 48F01970000384EFCB21AF65EC4C7993B67AB12362F18A314E5664C5F0C7309A66EF50
                                                      APIs
                                                      • CoInitialize.OLE32(00000000), ref: 0066F2DA
                                                      • CoCreateInstance.OLE32(006ADA7C,00000000,00000001,006AD8EC,?), ref: 0066F2F2
                                                      • CoUninitialize.OLE32 ref: 0066F555
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CreateInitializeInstanceUninitialize
                                                      • String ID: .lnk
                                                      • API String ID: 948891078-24824748
                                                      • Opcode ID: 2b9c2a556ce9df68016599c505ce4f3bff16af1c7a945a295fc0c30cf37835de
                                                      • Instruction ID: 2162cf6b9b0cc92cc63c55ba176a799c2cc7343068c08cc4c8cf18669f8d760d
                                                      • Opcode Fuzzy Hash: 2b9c2a556ce9df68016599c505ce4f3bff16af1c7a945a295fc0c30cf37835de
                                                      • Instruction Fuzzy Hash: F9A13AB1104201AFD740EF64D891EAFB7EDEF98314F00491DF55697192EB70EA09CBA6
                                                      APIs
                                                        • Part of subcall function 0062660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006253B1,?,?,006261FF,?,00000000,00000001,00000000), ref: 0062662F
                                                      • CoInitialize.OLE32(00000000), ref: 0066E85D
                                                      • CoCreateInstance.OLE32(006ADA7C,00000000,00000001,006AD8EC,?), ref: 0066E876
                                                      • CoUninitialize.OLE32 ref: 0066E893
                                                        • Part of subcall function 0062936C: __swprintf.LIBCMT ref: 006293AB
                                                        • Part of subcall function 0062936C: __itow.LIBCMT ref: 006293DF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                      • String ID: .lnk
                                                      • API String ID: 2126378814-24824748
                                                      • Opcode ID: d1633e6e78fbcb8b32fb8a42d76d224fe64a72801dce39fd6fe7df092b4ec278
                                                      • Instruction ID: 50d652132781e205843be95e01d8c50ea35872a36ed29d8da680e2fbd167d880
                                                      • Opcode Fuzzy Hash: d1633e6e78fbcb8b32fb8a42d76d224fe64a72801dce39fd6fe7df092b4ec278
                                                      • Instruction Fuzzy Hash: 11A154796047119FCB50EF14C48496ABBE6BF89310F04898CF9969B3A1CB32EC45CF95
                                                      APIs
                                                      • __startOneArgErrorHandling.LIBCMT ref: 006432ED
                                                        • Part of subcall function 0064E0D0: __87except.LIBCMT ref: 0064E10B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ErrorHandling__87except__start
                                                      • String ID: pow
                                                      • API String ID: 2905807303-2276729525
                                                      • Opcode ID: ec2a2b731a6aa9f30c7a0ba29fc91398d14dda941b39888f86ad32b71f74ef02
                                                      • Instruction ID: d1db6a3c103fa805677ac9e876653f83a4fba3779a7aa08258db022090bf17cd
                                                      • Opcode Fuzzy Hash: ec2a2b731a6aa9f30c7a0ba29fc91398d14dda941b39888f86ad32b71f74ef02
                                                      • Instruction Fuzzy Hash: 2C515A71A0820296CB127B14C9413FB3BD7BB40710F209E28E4D6823E9DFB68ED59A46
                                                      APIs
                                                      • CharUpperBuffW.USER32(0000000C,00000016,00000016,00000000,00000000,?,00000000,006BDC50,?,0000000F,0000000C,00000016,006BDC50,?), ref: 00664645
                                                        • Part of subcall function 0062936C: __swprintf.LIBCMT ref: 006293AB
                                                        • Part of subcall function 0062936C: __itow.LIBCMT ref: 006293DF
                                                      • CharUpperBuffW.USER32(?,?,00000000,?), ref: 006646C5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: BuffCharUpper$__itow__swprintf
                                                      • String ID: REMOVE$THIS
                                                      • API String ID: 3797816924-776492005
                                                      • Opcode ID: 3c0af158a056772f2052add8ec07033a0637866e2ed67d059811d99e3f97ad88
                                                      • Instruction ID: 746a6a6b48222d846935be0b74c123816ffce691d2dd300e29be1e8be8ea3934
                                                      • Opcode Fuzzy Hash: 3c0af158a056772f2052add8ec07033a0637866e2ed67d059811d99e3f97ad88
                                                      • Instruction Fuzzy Hash: 92415E34A002199FCF45EF64C881AAEBBB6FF49304F148469E916AB3A2DF34DD45CB54
                                                      APIs
                                                        • Part of subcall function 0066430B: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,0065BC08,?,?,00000034,00000800,?,00000034), ref: 00664335
                                                      • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0065C1D3
                                                        • Part of subcall function 006642D6: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,0065BC37,?,?,00000800,?,00001073,00000000,?,?), ref: 00664300
                                                        • Part of subcall function 0066422F: GetWindowThreadProcessId.USER32(?,?), ref: 0066425A
                                                        • Part of subcall function 0066422F: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0065BBCC,00000034,?,?,00001004,00000000,00000000), ref: 0066426A
                                                        • Part of subcall function 0066422F: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0065BBCC,00000034,?,?,00001004,00000000,00000000), ref: 00664280
                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0065C240
                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0065C28D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                      • String ID: @
                                                      • API String ID: 4150878124-2766056989
                                                      • Opcode ID: c7682a68f6b54a604503570a69523e04cd60d6314ea9a02b437600a29e9c3096
                                                      • Instruction ID: a929570c56e358b92ca36014d1147906d3c4939829bdafa0425e8835d06a6fbd
                                                      • Opcode Fuzzy Hash: c7682a68f6b54a604503570a69523e04cd60d6314ea9a02b437600a29e9c3096
                                                      • Instruction Fuzzy Hash: 55414C72900218BFDB10DFA4CC81AEEB779EF09710F104099FA45B7281DA71AF49CB61
                                                      APIs
                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,006BDC00,00000000,?,?,?,?), ref: 0068A6D8
                                                      • GetWindowLongW.USER32 ref: 0068A6F5
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0068A705
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Window$Long
                                                      • String ID: SysTreeView32
                                                      • API String ID: 847901565-1698111956
                                                      • Opcode ID: 3b1ac1abbe96535cc0bff1e18009da717377cef953d8b21c7b097c7ffb7637b0
                                                      • Instruction ID: 8d87f43d6ab1e5a2efefff8205733d6b1edb27b05581d8aa16e8df116be91b52
                                                      • Opcode Fuzzy Hash: 3b1ac1abbe96535cc0bff1e18009da717377cef953d8b21c7b097c7ffb7637b0
                                                      • Instruction Fuzzy Hash: CC31E131100206AFEB21AF74CC41BEA7BAAFF49324F24431AF975932E0D730AC509B94
                                                      APIs
                                                      • _memset.LIBCMT ref: 00675190
                                                      • InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 006751C6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CrackInternet_memset
                                                      • String ID: |$Dg
                                                      • API String ID: 1413715105-1330200442
                                                      • Opcode ID: 29499d9b9dda037cb65ca7a2290db4e89d51feb6427a16ec760bc1521dd31ee1
                                                      • Instruction ID: cd771f487d3030bdb2c32ab30f65413f1e5138b22486ce7814982b9e89835ad0
                                                      • Opcode Fuzzy Hash: 29499d9b9dda037cb65ca7a2290db4e89d51feb6427a16ec760bc1521dd31ee1
                                                      • Instruction Fuzzy Hash: 50315971C01119EBCF51EFA0DC81AEE7FBAFF14710F004059F915A6166EA31AA06CFA4
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 0068A15E
                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 0068A172
                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 0068A196
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window
                                                      • String ID: SysMonthCal32
                                                      • API String ID: 2326795674-1439706946
                                                      • Opcode ID: c53e14122089d48160764d7f1b65f6c35f66537f6c7775d9352b365033e950b5
                                                      • Instruction ID: ec12208ffd93071b41f5ed4454ea3f65c4678d85ce0ea703bd0fe334c7418808
                                                      • Opcode Fuzzy Hash: c53e14122089d48160764d7f1b65f6c35f66537f6c7775d9352b365033e950b5
                                                      • Instruction Fuzzy Hash: 73219F32510218BBEF119FA4CC86FEA3B7AEF48714F110215FE556B1D0D6B5AC55CB90
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 0068A941
                                                      • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 0068A94F
                                                      • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0068A956
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$DestroyWindow
                                                      • String ID: msctls_updown32
                                                      • API String ID: 4014797782-2298589950
                                                      • Opcode ID: 1edc8731e4f8f5b6518d86294282655c3922042edb086f8541d9681c9ee7a3b6
                                                      • Instruction ID: acb0408a4c414d8bae3b95e926cba938f773603173bdbecf2de044f1344d913c
                                                      • Opcode Fuzzy Hash: 1edc8731e4f8f5b6518d86294282655c3922042edb086f8541d9681c9ee7a3b6
                                                      • Instruction Fuzzy Hash: DD2192B5610209AFEB10EF58DCD1DA737AEEB5A354B05015AFA059B351CB30EC11DB61
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00689A30
                                                      • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00689A40
                                                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00689A65
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$MoveWindow
                                                      • String ID: Listbox
                                                      • API String ID: 3315199576-2633736733
                                                      • Opcode ID: c63e0555ba5749380d2a116b90ab7bd9218e408ec001dc930d6ac04c7d21d208
                                                      • Instruction ID: e19c4138c7835f96df4b3ef98ea62a758219fcac58ec0025a9b5c9262a1ddef0
                                                      • Opcode Fuzzy Hash: c63e0555ba5749380d2a116b90ab7bd9218e408ec001dc930d6ac04c7d21d208
                                                      • Instruction Fuzzy Hash: FC21C532610118BFDF259F54CC85EFF3BABEF8A750F058229F9455B290CA719C118BA0
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0068A46D
                                                      • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 0068A482
                                                      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 0068A48F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: msctls_trackbar32
                                                      • API String ID: 3850602802-1010561917
                                                      • Opcode ID: 3a5263244e8f592bc3861b3bca640168bfc7b18b27febab4c178d350f25d175d
                                                      • Instruction ID: 98911b3791ba69dd0bf1b022cf3b8ed122cb676add3a977600fde854b2352243
                                                      • Opcode Fuzzy Hash: 3a5263244e8f592bc3861b3bca640168bfc7b18b27febab4c178d350f25d175d
                                                      • Instruction Fuzzy Hash: D311CA71240208BEEF246F75CC49FEB37AAEF89754F014229FA45A6191D6B2E811DB24
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00642350,?), ref: 006422A1
                                                      • GetProcAddress.KERNEL32(00000000), ref: 006422A8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: RoInitialize$combase.dll
                                                      • API String ID: 2574300362-340411864
                                                      • Opcode ID: aa1bbbf017a40eeb28f2b4186bfcde306606700ca5ae8c3187c85dc850a24f7c
                                                      • Instruction ID: 99031faf73e89b9b51787976aea6de9395a029d305a07bbb658250e0031d0fd2
                                                      • Opcode Fuzzy Hash: aa1bbbf017a40eeb28f2b4186bfcde306606700ca5ae8c3187c85dc850a24f7c
                                                      • Instruction Fuzzy Hash: 07E09270A543419BEB506FB1DC8DB993657A705705F516024F202DD5A0DBF95584CF18
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00642276), ref: 00642376
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0064237D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: RoUninitialize$combase.dll
                                                      • API String ID: 2574300362-2819208100
                                                      • Opcode ID: a4fc3bdf2787d8b63bcbaa88b0147c43a4f76b28bb9616d5116e7f90ca60c92d
                                                      • Instruction ID: a4822092a7124dccecb588718d79ac3833cdc37d1274b16306138106911fb884
                                                      • Opcode Fuzzy Hash: a4fc3bdf2787d8b63bcbaa88b0147c43a4f76b28bb9616d5116e7f90ca60c92d
                                                      • Instruction Fuzzy Hash: 68E0B670649341ABEB216FE1ED4DB843B67B70570AF112414F20ADA5B0CBF86891CF14
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: LocalTime__swprintf
                                                      • String ID: %.3d$WIN_XPe
                                                      • API String ID: 2070861257-2409531811
                                                      • Opcode ID: f1298be93cea39ad663e9b5312dff5aa420643346f385217f1bbe31ab1a4c4ec
                                                      • Instruction ID: c6ecc8059ea2a97261c44e90f467277117df8713045ac4be90660ff6f96e1c34
                                                      • Opcode Fuzzy Hash: f1298be93cea39ad663e9b5312dff5aa420643346f385217f1bbe31ab1a4c4ec
                                                      • Instruction Fuzzy Hash: DAE012B1C04618DBCF5097D0DD09EF973FFA704741F100493B906A5900D6359B86EA56
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,006821FB,?,006823EF), ref: 00682213
                                                      • GetProcAddress.KERNEL32(00000000,GetProcessId), ref: 00682225
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: GetProcessId$kernel32.dll
                                                      • API String ID: 2574300362-399901964
                                                      • Opcode ID: 847b9232a6b44576cc6e38f12b00ed460579d34deee15ab51021648fa9c3c5a4
                                                      • Instruction ID: 95f3558cf9ddac685a8d17730b3d1941b3e42cd5d6b0d643a2fa3a52faff263d
                                                      • Opcode Fuzzy Hash: 847b9232a6b44576cc6e38f12b00ed460579d34deee15ab51021648fa9c3c5a4
                                                      • Instruction Fuzzy Hash: F1D0A7B48107139FC7216F70F828641B7D7EF0A300B01551AE846E2750DB70EC808B50
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,00000000,006242EC,?,006242AA,?), ref: 00624304
                                                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00624316
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                      • API String ID: 2574300362-1355242751
                                                      • Opcode ID: 790edc342499075807790fa44d64fd4a52cb9cee205711273292228d9ced734d
                                                      • Instruction ID: f381d9880d02ec616fa6e2418a9871bf64ca72b3a1886377faf0787910a6a81d
                                                      • Opcode Fuzzy Hash: 790edc342499075807790fa44d64fd4a52cb9cee205711273292228d9ced734d
                                                      • Instruction Fuzzy Hash: 03D0A770800B239FC7309F61F80C64577D6AF15301B01441AE447D2760EBB0DC808E10
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,006241BB,00624341,?,0062422F,?,006241BB,?,?,?,?,006239FE,?,00000001), ref: 00624359
                                                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 0062436B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                      • API String ID: 2574300362-3689287502
                                                      • Opcode ID: e2f3d6624d541852ad71bd7434a64c18d43b51c195e24ed23de6a6a08679483f
                                                      • Instruction ID: 7c2b3bcc4622f19d3b7b6a991eb58fb00ff0a7bd1c5c59d5b25ce03d63b66222
                                                      • Opcode Fuzzy Hash: e2f3d6624d541852ad71bd7434a64c18d43b51c195e24ed23de6a6a08679483f
                                                      • Instruction Fuzzy Hash: 18D0A770C04B23DFC7209F71F80864177D6AF25725B01451AE492D2750EBB0EC808E10
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(oleaut32.dll,00000000,0066052F,?,006606D7), ref: 00660572
                                                      • GetProcAddress.KERNEL32(00000000,UnRegisterTypeLibForUser), ref: 00660584
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: UnRegisterTypeLibForUser$oleaut32.dll
                                                      • API String ID: 2574300362-1587604923
                                                      • Opcode ID: 0f2bbf2490ba27762006ddae78714d00294ea5c4c02e4ac8bbe55fcc247b6776
                                                      • Instruction ID: 99d3d62cf5ed153e9a11b4f809ba25162ae06eb6865608e22ace0994a2ed1916
                                                      • Opcode Fuzzy Hash: 0f2bbf2490ba27762006ddae78714d00294ea5c4c02e4ac8bbe55fcc247b6776
                                                      • Instruction Fuzzy Hash: 7CD0A730850323AFD7206F70E808B4377E7AB15300B11882FE843D2750D770D8C08E20
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(oleaut32.dll,?,0066051D,?,006605FE), ref: 00660547
                                                      • GetProcAddress.KERNEL32(00000000,RegisterTypeLibForUser), ref: 00660559
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: RegisterTypeLibForUser$oleaut32.dll
                                                      • API String ID: 2574300362-1071820185
                                                      • Opcode ID: eabc49dd6d1a5e8b42830f5b59a8316bcb2e304ff0dd2deb1e9d39a37ff2463a
                                                      • Instruction ID: ebd959044b1736e80e248e56dcb631f819bc8460f2adb3a453a08f28a6f3155d
                                                      • Opcode Fuzzy Hash: eabc49dd6d1a5e8b42830f5b59a8316bcb2e304ff0dd2deb1e9d39a37ff2463a
                                                      • Instruction Fuzzy Hash: 61D0A7308507139FD7209F61E80864676E6AB11301B11C82EE447D2760D670DC808E10
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,0067ECBE,?,0067EBBB), ref: 0067ECD6
                                                      • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0067ECE8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                      • API String ID: 2574300362-1816364905
                                                      • Opcode ID: 151858f361ca49ec40f78c816e4e4179d5c6aab4e08e824dab7ce67640a422c4
                                                      • Instruction ID: 4c4d6bdd27c2a6b74d141cad5eda129b2096ca2114764967195909291377d409
                                                      • Opcode Fuzzy Hash: 151858f361ca49ec40f78c816e4e4179d5c6aab4e08e824dab7ce67640a422c4
                                                      • Instruction Fuzzy Hash: 02D0A7758007239FCB216F60E94864277E6AF05300B01C45EF85AD2750DF74DC848E10
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,00000000,0067BAD3,00000001,0067B6EE,?,006BDC00), ref: 0067BAEB
                                                      • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 0067BAFD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: GetModuleHandleExW$kernel32.dll
                                                      • API String ID: 2574300362-199464113
                                                      • Opcode ID: af8799ed2411e5abdce927b081cd8ad1994949f329b59ff7c240ca3fcb0fb161
                                                      • Instruction ID: d076fe9df96e078dd7cd78ca4a615ca1a57ca2960cc7ab3fca967bef02033c8b
                                                      • Opcode Fuzzy Hash: af8799ed2411e5abdce927b081cd8ad1994949f329b59ff7c240ca3fcb0fb161
                                                      • Instruction Fuzzy Hash: 2BD05E70D107139FC7306F60A848B5176D6AB05700B01941AE847D2750DB70DC80CA10
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(advapi32.dll,?,00683BD1,?,00683E06), ref: 00683BE9
                                                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00683BFB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                      • API String ID: 2574300362-4033151799
                                                      • Opcode ID: f54134c22d092d1bbb35d8d6cd66a1e5c6ff4ca30d459a8ca11a7facfd6e6cdc
                                                      • Instruction ID: 4a457a17143d0043e9102dc273708ddf362d051c47b369a25467fe71d059a60d
                                                      • Opcode Fuzzy Hash: f54134c22d092d1bbb35d8d6cd66a1e5c6ff4ca30d459a8ca11a7facfd6e6cdc
                                                      • Instruction Fuzzy Hash: 0BD0A7B08007629FC7207FA0E808643BAF6AF02714B11441AE447E2750DBB0DC808F10
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ab7a7f3619fc562244c3513288c650a23df65c21cf4a9c02c07071cb0c8bb3c1
                                                      • Instruction ID: 857cf23406a753c39f6f18bbe75ba2ee827738c6075b3420faff2ab093d9d80b
                                                      • Opcode Fuzzy Hash: ab7a7f3619fc562244c3513288c650a23df65c21cf4a9c02c07071cb0c8bb3c1
                                                      • Instruction Fuzzy Hash: 3DC16C75A0021AEFCB14DF94C885AAEB7B6FF48701F104598ED06EB251D730EE45DBA0
                                                      APIs
                                                      • CoInitialize.OLE32(00000000), ref: 0067AAB4
                                                      • CoUninitialize.OLE32 ref: 0067AABF
                                                        • Part of subcall function 00660213: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0066027B
                                                      • VariantInit.OLEAUT32(?), ref: 0067AACA
                                                      • VariantClear.OLEAUT32(?), ref: 0067AD9D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                      • String ID:
                                                      • API String ID: 780911581-0
                                                      • Opcode ID: 4150aef959216b4696c53841088b83775c0a5b440a5c0af21dec9fe57c768d7d
                                                      • Instruction ID: f4e3bb2eb5cbf26be937a315e2c23aaea9959376648443df731c779f979751d7
                                                      • Opcode Fuzzy Hash: 4150aef959216b4696c53841088b83775c0a5b440a5c0af21dec9fe57c768d7d
                                                      • Instruction Fuzzy Hash: 7AA14575204B119FCB51EF54C491A5EB7E6BF88710F14844DFA9A9B3A2CB30ED01CB9A
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Variant$AllocClearCopyInitString
                                                      • String ID:
                                                      • API String ID: 2808897238-0
                                                      • Opcode ID: 465fed04cf8d1039710ab3d3614f9ab4297c2a47a29e241039957477283a32df
                                                      • Instruction ID: 8c86675e60938573f670f334c7588406577a56b29b81e207c5110ddabec90cd3
                                                      • Opcode Fuzzy Hash: 465fed04cf8d1039710ab3d3614f9ab4297c2a47a29e241039957477283a32df
                                                      • Instruction Fuzzy Hash: CE51F830604306DBDB60AF65D491A6EB3E7EF49315F20982FE946CB2D1DB349849CB25
                                                      APIs
                                                      • GetWindowRect.USER32(00C89D08,?), ref: 0068C544
                                                      • ScreenToClient.USER32(?,00000002), ref: 0068C574
                                                      • MoveWindow.USER32(00000002,?,?,?,000000FF,00000001,?,00000002,?,?,?,00000002,?,?), ref: 0068C5DA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Window$ClientMoveRectScreen
                                                      • String ID:
                                                      • API String ID: 3880355969-0
                                                      • Opcode ID: 9d58792fc932b8d157a2e99b4f47ab38273ebc1e36d13b33b0a1fcd33b549d5a
                                                      • Instruction ID: cfc2975f7b6dc453bb7218d71e1196a22d41a50809940c26c5d0145c3106d0a3
                                                      • Opcode Fuzzy Hash: 9d58792fc932b8d157a2e99b4f47ab38273ebc1e36d13b33b0a1fcd33b549d5a
                                                      • Instruction Fuzzy Hash: 0B512C75900205EFCF20EF68C880AAE7BB7EB55320F109669F9559B291D770ED91CBA0
                                                      APIs
                                                      • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 0065C462
                                                      • __itow.LIBCMT ref: 0065C49C
                                                        • Part of subcall function 0065C6E8: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 0065C753
                                                      • SendMessageW.USER32(?,0000110A,00000001,?), ref: 0065C505
                                                      • __itow.LIBCMT ref: 0065C55A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$__itow
                                                      • String ID:
                                                      • API String ID: 3379773720-0
                                                      • Opcode ID: b35b678ec294a5b3c1f31013629437b9cf8209217026fd812d455ac575dced9e
                                                      • Instruction ID: eaa38b83d11b9355b776d94755fe78e7915199920bffb434df8906c32e307746
                                                      • Opcode Fuzzy Hash: b35b678ec294a5b3c1f31013629437b9cf8209217026fd812d455ac575dced9e
                                                      • Instruction Fuzzy Hash: 5741E170A00718AFDF20EF54D855FEE7BBAAF49721F000019F906A7281DB709A598FA5
                                                      APIs
                                                      • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00663966
                                                      • SetKeyboardState.USER32(00000080,?,00000001), ref: 00663982
                                                      • PostMessageW.USER32(00000000,00000102,?,00000001), ref: 006639EF
                                                      • SendInput.USER32(00000001,?,0000001C,00000000,?,00000001), ref: 00663A4D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: KeyboardState$InputMessagePostSend
                                                      • String ID:
                                                      • API String ID: 432972143-0
                                                      • Opcode ID: 62a9faabb35aa5ef2a80b710101c54b09a7c3079856e90cf181dd5157a50a886
                                                      • Instruction ID: 55f56a7b2550e7e6f3273d531d44b8e134ef3a29136e8a261b1394acd78cb959
                                                      • Opcode Fuzzy Hash: 62a9faabb35aa5ef2a80b710101c54b09a7c3079856e90cf181dd5157a50a886
                                                      • Instruction Fuzzy Hash: D7410770E04668AAEF208B648815BFDBBB7AF55310F04025AF4C2963C1DBB49E85DF65
                                                      APIs
                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0066E742
                                                      • GetLastError.KERNEL32(?,00000000), ref: 0066E768
                                                      • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0066E78D
                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0066E7B9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CreateHardLink$DeleteErrorFileLast
                                                      • String ID:
                                                      • API String ID: 3321077145-0
                                                      • Opcode ID: d4d648443ae3e5d61e796db9b70e9e1cc9f8c303919eed8663e4a4b3d845956b
                                                      • Instruction ID: 388e50078801809bc1bf820f7be845b382e580bcac7833804d4d28272d06652a
                                                      • Opcode Fuzzy Hash: d4d648443ae3e5d61e796db9b70e9e1cc9f8c303919eed8663e4a4b3d845956b
                                                      • Instruction Fuzzy Hash: 29410339600A11DFCF11EF15C444A4DBBE6AF99710F198498E946AB3A2CB31FD01CF99
                                                      APIs
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0068B5D1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: InvalidateRect
                                                      • String ID:
                                                      • API String ID: 634782764-0
                                                      • Opcode ID: 47b92b870a6dc1fcb66cba10ba836e647e68fd679df5bd75f95262dbfb98ee6e
                                                      • Instruction ID: 40730779a1c8dbeaeea15c7ca6e487358f560350a4de9a5d245ec46b15520666
                                                      • Opcode Fuzzy Hash: 47b92b870a6dc1fcb66cba10ba836e647e68fd679df5bd75f95262dbfb98ee6e
                                                      • Instruction Fuzzy Hash: 2A31BE74601204BFEF30BF18CC85FE87B67AB06310F546311FA52D62E2E770A9819B56
                                                      APIs
                                                      • ClientToScreen.USER32(?,?), ref: 0068D807
                                                      • GetWindowRect.USER32(?,?), ref: 0068D87D
                                                      • PtInRect.USER32(?,?,0068ED5A), ref: 0068D88D
                                                      • MessageBeep.USER32(00000000), ref: 0068D8FE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Rect$BeepClientMessageScreenWindow
                                                      • String ID:
                                                      • API String ID: 1352109105-0
                                                      • Opcode ID: 76cf6ec832c1029be29035756283361203ea9d725def1ac4a0c6fb5d53471afd
                                                      • Instruction ID: 7dd71c397b5e0132559606b189f6a95e1f7b6dda54d78c5e8e4a4aae875c0b82
                                                      • Opcode Fuzzy Hash: 76cf6ec832c1029be29035756283361203ea9d725def1ac4a0c6fb5d53471afd
                                                      • Instruction Fuzzy Hash: 48416DB4A00259DFCB11EF58D884BA97BF7FB4A350F1882A9E4159F290D730E945CB60
                                                      APIs
                                                      • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 00663AB8
                                                      • SetKeyboardState.USER32(00000080,?,00008000), ref: 00663AD4
                                                      • PostMessageW.USER32(00000000,00000101,00000000,?), ref: 00663B34
                                                      • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 00663B92
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: KeyboardState$InputMessagePostSend
                                                      • String ID:
                                                      • API String ID: 432972143-0
                                                      • Opcode ID: f58ced88dc15c185b67cf9aa008dfedf53d63a59754933bcdff984a0e8ea875d
                                                      • Instruction ID: 77c71ce2c1c1b7bc148d7657ce503f6433782eed44d425384d4c6be19b9da928
                                                      • Opcode Fuzzy Hash: f58ced88dc15c185b67cf9aa008dfedf53d63a59754933bcdff984a0e8ea875d
                                                      • Instruction Fuzzy Hash: 1331F470E00268AEFF219B64C819BFE7BAB9B66310F04015AE482933D1C7759F45D7A5
                                                      APIs
                                                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00654038
                                                      • __isleadbyte_l.LIBCMT ref: 00654066
                                                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 00654094
                                                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 006540CA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                      • String ID:
                                                      • API String ID: 3058430110-0
                                                      • Opcode ID: becf3a8a874e47a5b9092aa7e780b36e5695ee6a66ae509eb4864f9d67d77837
                                                      • Instruction ID: c2ede3e8b9bb54f85f4af15d21b02e59636fe801a9cd32267c38639993315ef9
                                                      • Opcode Fuzzy Hash: becf3a8a874e47a5b9092aa7e780b36e5695ee6a66ae509eb4864f9d67d77837
                                                      • Instruction Fuzzy Hash: 6B31C330504206AFDB219F75C844BAA7BA7FF41316F2540A8EA518B2D0DB31D8D5DB90
                                                      APIs
                                                      • GetForegroundWindow.USER32 ref: 00687CB9
                                                        • Part of subcall function 00665F55: GetWindowThreadProcessId.USER32(?,00000000), ref: 00665F6F
                                                        • Part of subcall function 00665F55: GetCurrentThreadId.KERNEL32 ref: 00665F76
                                                        • Part of subcall function 00665F55: AttachThreadInput.USER32(00000000,?,0066781F), ref: 00665F7D
                                                      • GetCaretPos.USER32(?), ref: 00687CCA
                                                      • ClientToScreen.USER32(00000000,?), ref: 00687D03
                                                      • GetForegroundWindow.USER32 ref: 00687D09
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                      • String ID:
                                                      • API String ID: 2759813231-0
                                                      • Opcode ID: 406631fe99d43797590720315a1411f5e1a8e2b5f9099d087c20006aaa5e7d2d
                                                      • Instruction ID: b525a7a12dd9510797c1b81e292d8e7008206b80e4d7050743300475482bfbc9
                                                      • Opcode Fuzzy Hash: 406631fe99d43797590720315a1411f5e1a8e2b5f9099d087c20006aaa5e7d2d
                                                      • Instruction Fuzzy Hash: EB312F71900108AFDB40EFA5C8459EFBBFAEF58310F10946AF815E3211DA31AE058FA4
                                                      APIs
                                                        • Part of subcall function 0063B34E: GetWindowLongW.USER32(?,000000EB), ref: 0063B35F
                                                      • GetCursorPos.USER32(?), ref: 0068F211
                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0069E4C0,?,?,?,?,?), ref: 0068F226
                                                      • GetCursorPos.USER32(?), ref: 0068F270
                                                      • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0069E4C0,?,?,?), ref: 0068F2A6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                      • String ID:
                                                      • API String ID: 2864067406-0
                                                      • Opcode ID: f55ec48a05491f038c648121e0b4bae257c1327966e52ff3fbcef1bfb81189e0
                                                      • Instruction ID: bbefbb6b309c2694a3ea4110f6a54738e97c06a89aaa92a3e7c984a6a57d6829
                                                      • Opcode Fuzzy Hash: f55ec48a05491f038c648121e0b4bae257c1327966e52ff3fbcef1bfb81189e0
                                                      • Instruction Fuzzy Hash: 04219139601118AFCB15AF94C868EEEBBB7EF0A710F044169F9054B2A1D7319E51DBA0
                                                      APIs
                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00674358
                                                        • Part of subcall function 006743E2: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00674401
                                                        • Part of subcall function 006743E2: InternetCloseHandle.WININET(00000000), ref: 0067449E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Internet$CloseConnectHandleOpen
                                                      • String ID:
                                                      • API String ID: 1463438336-0
                                                      • Opcode ID: 3a28ee50eb8683d87c9ae35f6664af4ae4d2b8aa5057e1663932d09681fe67a5
                                                      • Instruction ID: a94f2f1710713b55fb63feb49e37086548729ac295e661d9987c870bf9e2b1ba
                                                      • Opcode Fuzzy Hash: 3a28ee50eb8683d87c9ae35f6664af4ae4d2b8aa5057e1663932d09681fe67a5
                                                      • Instruction Fuzzy Hash: A221D131200601BBEB159F619C04FBBB7ABFF44720F10811EBA1E96690DF71E8219B90
                                                      APIs
                                                      • select.WSOCK32(00000000,00000001,00000000,00000000,?), ref: 00678AE0
                                                      • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00678AF2
                                                      • accept.WSOCK32(00000000,00000000,00000000), ref: 00678AFF
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00678B16
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastacceptselect
                                                      • String ID:
                                                      • API String ID: 385091864-0
                                                      • Opcode ID: 7f2b06b210ee1204935d9f64878ff1202238fbac499d0396e8b6520ea9e54ef9
                                                      • Instruction ID: 715254feb141ceb680af10da7a31cb6a90b38ddfce07a76afba3010455c23712
                                                      • Opcode Fuzzy Hash: 7f2b06b210ee1204935d9f64878ff1202238fbac499d0396e8b6520ea9e54ef9
                                                      • Instruction Fuzzy Hash: 6B21C372A001249FC7549F68C884ADEBBEDEF4A710F00816AF84AD7291DB74EE418F90
                                                      APIs
                                                      • GetWindowLongW.USER32(?,000000EC), ref: 00688AA6
                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00688AC0
                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00688ACE
                                                      • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00688ADC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Window$Long$AttributesLayered
                                                      • String ID:
                                                      • API String ID: 2169480361-0
                                                      • Opcode ID: 457912e879c37996e5301972598a13f1956d2ec36fd1da2fd22d435b50609f08
                                                      • Instruction ID: 02b8071ff31cd37fd5aabc56ac65041653bc2bcc9fe2d6e798c08ec397d4345d
                                                      • Opcode Fuzzy Hash: 457912e879c37996e5301972598a13f1956d2ec36fd1da2fd22d435b50609f08
                                                      • Instruction Fuzzy Hash: 95118E31245521AFDB58BB18DC15FBA779BEF8A320F144219F916C72E2CB74BD018B94
                                                      APIs
                                                        • Part of subcall function 00661E68: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00660ABB,?,?,?,0066187A,00000000,000000EF,00000119,?,?), ref: 00661E77
                                                        • Part of subcall function 00661E68: lstrcpyW.KERNEL32(00000000,?,?,00660ABB,?,?,?,0066187A,00000000,000000EF,00000119,?,?,00000000), ref: 00661E9D
                                                        • Part of subcall function 00661E68: lstrcmpiW.KERNEL32(00000000,?,00660ABB,?,?,?,0066187A,00000000,000000EF,00000119,?,?), ref: 00661ECE
                                                      • lstrlenW.KERNEL32(?,00000002,?,?,?,?,0066187A,00000000,000000EF,00000119,?,?,00000000), ref: 00660AD4
                                                      • lstrcpyW.KERNEL32(00000000,?,?,0066187A,00000000,000000EF,00000119,?,?,00000000), ref: 00660AFA
                                                      • lstrcmpiW.KERNEL32(00000002,cdecl,?,0066187A,00000000,000000EF,00000119,?,?,00000000), ref: 00660B2E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: lstrcmpilstrcpylstrlen
                                                      • String ID: cdecl
                                                      • API String ID: 4031866154-3896280584
                                                      • Opcode ID: 0ffb64b4b07f8ef2de4dd2924a058057f7c418fa81814f9456f6090ff1b2548e
                                                      • Instruction ID: 6fd78201d884b35cf37ba7d3629546d063cb431a64dd29f8587cf3ea7f08fcc4
                                                      • Opcode Fuzzy Hash: 0ffb64b4b07f8ef2de4dd2924a058057f7c418fa81814f9456f6090ff1b2548e
                                                      • Instruction Fuzzy Hash: B511963A200305AFDB25AF24DC45D7A77AAFF56354F80807AE906CB250EB72D851D7E4
                                                      APIs
                                                      • _free.LIBCMT ref: 00652FB5
                                                        • Part of subcall function 0064395C: __FF_MSGBANNER.LIBCMT ref: 00643973
                                                        • Part of subcall function 0064395C: __NMSG_WRITE.LIBCMT ref: 0064397A
                                                        • Part of subcall function 0064395C: RtlAllocateHeap.NTDLL(00C60000,00000000,00000001,00000001,00000000,?,?,0063F507,?,0000000E), ref: 0064399F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap_free
                                                      • String ID:
                                                      • API String ID: 614378929-0
                                                      • Opcode ID: 6818eb1b93a91f52d9044e923e5dc041cf071423505eedf8cd1fee959d188fda
                                                      • Instruction ID: d3976f804f20670408c19d6e9f4b2ca6b0efc73255842ebfa5a9bdf4c6271949
                                                      • Opcode Fuzzy Hash: 6818eb1b93a91f52d9044e923e5dc041cf071423505eedf8cd1fee959d188fda
                                                      • Instruction Fuzzy Hash: FF110D31548322EFDF313FB0AC546A93B97AF067A1F204419FC499A391DB34C9458B94
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 006605AC
                                                      • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 006605C7
                                                      • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 006605DD
                                                      • FreeLibrary.KERNEL32(?), ref: 00660632
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Type$FileFreeLibraryLoadModuleNameRegister
                                                      • String ID:
                                                      • API String ID: 3137044355-0
                                                      • Opcode ID: ccc0b6b900fcfecd825fe674d0a0a037631ead69ce6b57b37521a1d9ccc7d190
                                                      • Instruction ID: 86f3d6e29d84d702ec2389e593171ea2fddada36382e6baec5aa6e85271d7130
                                                      • Opcode Fuzzy Hash: ccc0b6b900fcfecd825fe674d0a0a037631ead69ce6b57b37521a1d9ccc7d190
                                                      • Instruction Fuzzy Hash: B0216771900209FBEB209F91DC98ADBBBBAEF80700F00847AE516D6150DBB0EA55DF60
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00666733
                                                      • _memset.LIBCMT ref: 00666754
                                                      • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 006667A6
                                                      • CloseHandle.KERNEL32(00000000), ref: 006667AF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CloseControlCreateDeviceFileHandle_memset
                                                      • String ID:
                                                      • API String ID: 1157408455-0
                                                      • Opcode ID: 607d18aa0b32c01c99a0a10f31de36756d2a933796640ee1e8d89df5f4be9ac8
                                                      • Instruction ID: b11200d3e823c7567a8c252fb23d839fb7c62561028d7a6db00a01f8bffc5a5b
                                                      • Opcode Fuzzy Hash: 607d18aa0b32c01c99a0a10f31de36756d2a933796640ee1e8d89df5f4be9ac8
                                                      • Instruction Fuzzy Hash: 521106769012287AE720ABA5AC4DFEBBABCEF45764F10419AF505E71C0D2705F80CBA4
                                                      APIs
                                                        • Part of subcall function 0065AA62: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 0065AA79
                                                        • Part of subcall function 0065AA62: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 0065AA83
                                                        • Part of subcall function 0065AA62: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 0065AA92
                                                        • Part of subcall function 0065AA62: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 0065AA99
                                                        • Part of subcall function 0065AA62: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0065AAAF
                                                      • GetLengthSid.ADVAPI32(?,00000000,0065ADE4,?,?), ref: 0065B21B
                                                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 0065B227
                                                      • HeapAlloc.KERNEL32(00000000), ref: 0065B22E
                                                      • CopySid.ADVAPI32(?,00000000,?), ref: 0065B247
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Heap$AllocInformationProcessToken$CopyErrorLastLength
                                                      • String ID:
                                                      • API String ID: 4217664535-0
                                                      • Opcode ID: 30669446b5c340f3077336124d896615585c9e92fbc71190c71fe04834149039
                                                      • Instruction ID: 2617770632a9250ef3609acb66e0bd80a58d024b3aa6f3d5de26dd6e1715ccd3
                                                      • Opcode Fuzzy Hash: 30669446b5c340f3077336124d896615585c9e92fbc71190c71fe04834149039
                                                      • Instruction Fuzzy Hash: 5B119171A00205EFDB049F98DC85ABEB7AAEF85305F14A02DE94397350D731AE48CB20
                                                      APIs
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 0065B498
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0065B4AA
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0065B4C0
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0065B4DB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: 62dc089feb45561d51716f904ff2a2c19e5adaada039573d046a810e57ebb311
                                                      • Instruction ID: 7bcc18fcfdbda6283eb8a8272aa08b2b45a64fbe7f0ddf7b6262808371cc7dac
                                                      • Opcode Fuzzy Hash: 62dc089feb45561d51716f904ff2a2c19e5adaada039573d046a810e57ebb311
                                                      • Instruction Fuzzy Hash: 8F115A7A900218FFDB21DFA8C881EDDBBB5FB08700F204091EA04B7294D771AE11DB94
                                                      APIs
                                                        • Part of subcall function 0063B34E: GetWindowLongW.USER32(?,000000EB), ref: 0063B35F
                                                      • DefDlgProcW.USER32(?,00000020,?,00000000), ref: 0063B5A5
                                                      • GetClientRect.USER32(?,?), ref: 0069E69A
                                                      • GetCursorPos.USER32(?), ref: 0069E6A4
                                                      • ScreenToClient.USER32(?,?), ref: 0069E6AF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Client$CursorLongProcRectScreenWindow
                                                      • String ID:
                                                      • API String ID: 4127811313-0
                                                      • Opcode ID: 80b795030f2c1203dceaf2647739d2c6d37ab44e98b04520b8fcacfdec74192a
                                                      • Instruction ID: 252199648b11bd9fe4d06f4b8fb5887459c3672e01cba772a980c9b676d625a3
                                                      • Opcode Fuzzy Hash: 80b795030f2c1203dceaf2647739d2c6d37ab44e98b04520b8fcacfdec74192a
                                                      • Instruction Fuzzy Hash: 34113671A00129BBCB10EF94C8858EE7BBAEB0A314F001455FA02E7640D330BA82CBA5
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 00667352
                                                      • MessageBoxW.USER32(?,?,?,?), ref: 00667385
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0066739B
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 006673A2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                      • String ID:
                                                      • API String ID: 2880819207-0
                                                      • Opcode ID: 6731e6613d27b071369dcf95bf7832d5236ca5d5b6fbcbd9bfa8ad608b6e47b1
                                                      • Instruction ID: 70e1289101bddd44e4978844f1f14099c5fd7c430060591eca35e7c004ae6438
                                                      • Opcode Fuzzy Hash: 6731e6613d27b071369dcf95bf7832d5236ca5d5b6fbcbd9bfa8ad608b6e47b1
                                                      • Instruction Fuzzy Hash: 7C110872A04254BFC7019B68DC49ADE7BAF9B45314F144315F921E3351D6709E008BA0
                                                      APIs
                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0063D1BA
                                                      • GetStockObject.GDI32(00000011), ref: 0063D1CE
                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 0063D1D8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CreateMessageObjectSendStockWindow
                                                      • String ID:
                                                      • API String ID: 3970641297-0
                                                      • Opcode ID: 33a3e85611a44241c2852599baa111894f97fc06895dac61d1b16d63c50787a9
                                                      • Instruction ID: 375527f5c9a12b189c02ca8e72060402f9a9936e7d82d941f4b3988f2daf1c92
                                                      • Opcode Fuzzy Hash: 33a3e85611a44241c2852599baa111894f97fc06895dac61d1b16d63c50787a9
                                                      • Instruction Fuzzy Hash: CA11AD72501509BFEF125F90AC50EEABB6FFF093A4F041106FA0552150C732ED61ABE0
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                      • String ID:
                                                      • API String ID: 3016257755-0
                                                      • Opcode ID: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                      • Instruction ID: d0361ae578d3862cf8603e886bd68818dda00829b80281a49a85a2b4bc8c3a74
                                                      • Opcode Fuzzy Hash: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                      • Instruction Fuzzy Hash: 31017E3200014ABBCF125E84DC168EE3F23BB18356F488495FE1959131D736CAB6AB85
                                                      APIs
                                                        • Part of subcall function 00647A0D: __getptd_noexit.LIBCMT ref: 00647A0E
                                                      • __lock.LIBCMT ref: 0064748F
                                                      • InterlockedDecrement.KERNEL32(?), ref: 006474AC
                                                      • _free.LIBCMT ref: 006474BF
                                                      • InterlockedIncrement.KERNEL32(00C892D8), ref: 006474D7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Interlocked$DecrementIncrement__getptd_noexit__lock_free
                                                      • String ID:
                                                      • API String ID: 2704283638-0
                                                      • Opcode ID: 04ece95c767dace7c6675d2dac3cc710179d3c731a2c33e487c2e0d1f5aeb252
                                                      • Instruction ID: 48ab1e67793409340b580b932926b2f6a20d0bbf08be2c0910455f05eb6112e4
                                                      • Opcode Fuzzy Hash: 04ece95c767dace7c6675d2dac3cc710179d3c731a2c33e487c2e0d1f5aeb252
                                                      • Instruction Fuzzy Hash: DD019635D0A611DBC751AF6495057ADBBA3BF06711F16400AF414B7790CB346941CFDA
                                                      APIs
                                                        • Part of subcall function 0063AF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 0063AFE3
                                                        • Part of subcall function 0063AF83: SelectObject.GDI32(?,00000000), ref: 0063AFF2
                                                        • Part of subcall function 0063AF83: BeginPath.GDI32(?), ref: 0063B009
                                                        • Part of subcall function 0063AF83: SelectObject.GDI32(?,00000000), ref: 0063B033
                                                      • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0068EA8E
                                                      • LineTo.GDI32(00000000,?,?), ref: 0068EA9B
                                                      • EndPath.GDI32(00000000), ref: 0068EAAB
                                                      • StrokePath.GDI32(00000000), ref: 0068EAB9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                      • String ID:
                                                      • API String ID: 1539411459-0
                                                      • Opcode ID: 9d96752aa61bf665cc386e42c63769f879edd7807a78dafbd6a6f092cf9ca655
                                                      • Instruction ID: 5b43e1a0be7ed853fc28da8674cec36fee59ee5fc8e8a58a8d3159a164ffba70
                                                      • Opcode Fuzzy Hash: 9d96752aa61bf665cc386e42c63769f879edd7807a78dafbd6a6f092cf9ca655
                                                      • Instruction Fuzzy Hash: 40F05E31005259BBDB12AF94AC09FCA3F5BAF07711F044201FA12651E187756652DB99
                                                      APIs
                                                      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0065C84A
                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 0065C85D
                                                      • GetCurrentThreadId.KERNEL32 ref: 0065C864
                                                      • AttachThreadInput.USER32(00000000), ref: 0065C86B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                      • String ID:
                                                      • API String ID: 2710830443-0
                                                      • Opcode ID: 04f454f3c1ce767b48a7c2c865ed6f825cb0303ab7ba7f4796b2d67bd0cf0798
                                                      • Instruction ID: 0feeae7f238d588de1e1b45a19f05285fbadd26e80815704514c02ff911ec93e
                                                      • Opcode Fuzzy Hash: 04f454f3c1ce767b48a7c2c865ed6f825cb0303ab7ba7f4796b2d67bd0cf0798
                                                      • Instruction Fuzzy Hash: D5E030711412247ADB102B61DC0DEDB7F5DEF067A1F009011B90A84850C6719585DFE0
                                                      APIs
                                                      • GetCurrentThread.KERNEL32 ref: 0065B0D6
                                                      • OpenThreadToken.ADVAPI32(00000000,?,?,?,0065AC9D), ref: 0065B0DD
                                                      • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,0065AC9D), ref: 0065B0EA
                                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,0065AC9D), ref: 0065B0F1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CurrentOpenProcessThreadToken
                                                      • String ID:
                                                      • API String ID: 3974789173-0
                                                      • Opcode ID: 62a1f46fa3586d374fc5173f5c3649007ae8ff2823a9eebffdbbb1db24261ee3
                                                      • Instruction ID: 83f888001fd9ebc0170b174c30f1eafa698d3afd7074889c940abedf8b9d6329
                                                      • Opcode Fuzzy Hash: 62a1f46fa3586d374fc5173f5c3649007ae8ff2823a9eebffdbbb1db24261ee3
                                                      • Instruction Fuzzy Hash: FAE08672601211ABD7202FB15C0DF873BAAEF56792F019818F643D6080DB349406CF60
                                                      APIs
                                                      • GetSysColor.USER32(00000008), ref: 0063B496
                                                      • SetTextColor.GDI32(?,000000FF), ref: 0063B4A0
                                                      • SetBkMode.GDI32(?,00000001), ref: 0063B4B5
                                                      • GetStockObject.GDI32(00000005), ref: 0063B4BD
                                                      • GetWindowDC.USER32(?,00000000), ref: 0069DE2B
                                                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 0069DE38
                                                      • GetPixel.GDI32(00000000,?,00000000), ref: 0069DE51
                                                      • GetPixel.GDI32(00000000,00000000,?), ref: 0069DE6A
                                                      • GetPixel.GDI32(00000000,?,?), ref: 0069DE8A
                                                      • ReleaseDC.USER32(?,00000000), ref: 0069DE95
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                      • String ID:
                                                      • API String ID: 1946975507-0
                                                      • Opcode ID: d6f8ebe5d14c260b335bae9154e4a05f0d0b6680e69c604b8fb6eb15ed960909
                                                      • Instruction ID: 1d6df023590888e9021fa083270c3e5a37337e2d0670d0b6ff386732676fb8ee
                                                      • Opcode Fuzzy Hash: d6f8ebe5d14c260b335bae9154e4a05f0d0b6680e69c604b8fb6eb15ed960909
                                                      • Instruction Fuzzy Hash: BDE06D31500240AEDF216F64AC09BD83B12AB12339F00D266F66A584E2C3714981CF21
                                                      APIs
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0065B2DF
                                                      • UnloadUserProfile.USERENV(?,?), ref: 0065B2EB
                                                      • CloseHandle.KERNEL32(?), ref: 0065B2F4
                                                      • CloseHandle.KERNEL32(?), ref: 0065B2FC
                                                        • Part of subcall function 0065AB24: GetProcessHeap.KERNEL32(00000000,?,0065A848), ref: 0065AB2B
                                                        • Part of subcall function 0065AB24: HeapFree.KERNEL32(00000000), ref: 0065AB32
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                      • String ID:
                                                      • API String ID: 146765662-0
                                                      • Opcode ID: d9c13fb442757d195a29fe2f72baada76923fd29cd1137aa3b3890de23a0a6bb
                                                      • Instruction ID: 2e66d488a40bfb67f52fc75d471d083451bff4ed7300279e1b11caa9c3c7efaf
                                                      • Opcode Fuzzy Hash: d9c13fb442757d195a29fe2f72baada76923fd29cd1137aa3b3890de23a0a6bb
                                                      • Instruction Fuzzy Hash: CCE0B63A104005BBCB013FA5EC08859FBA7FF8A3613109221F62681971CB32A871EF91
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                      • String ID:
                                                      • API String ID: 2889604237-0
                                                      • Opcode ID: a4b987fc66be230cee6235bbf3ffb71f5adddec6940708723b24484db5a0019b
                                                      • Instruction ID: ccd799e41eb6307d3d15094c39ad5c1bfdb04e775ac901cd80969324ac828d11
                                                      • Opcode Fuzzy Hash: a4b987fc66be230cee6235bbf3ffb71f5adddec6940708723b24484db5a0019b
                                                      • Instruction Fuzzy Hash: B2E046B1500204EFDF006F70D848A2E7BAAEB4C350F12F80AFC5B8B650CB74A8418F90
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                      • String ID:
                                                      • API String ID: 2889604237-0
                                                      • Opcode ID: 6deeac66d231541429b6247a45ea2480d131fb33ed8c1ee5ec7debc668f4b0cf
                                                      • Instruction ID: fa73e68b20663103c38b5110e96833a90ec51659da29cba61dc6f92e0d5f4375
                                                      • Opcode Fuzzy Hash: 6deeac66d231541429b6247a45ea2480d131fb33ed8c1ee5ec7debc668f4b0cf
                                                      • Instruction Fuzzy Hash: 5EE046B1500200EFDB006F70D84862D7BAAEB4D390F12E809F95B8B650CB78A8018F50
                                                      APIs
                                                      • OleSetContainedObject.OLE32(?,00000001), ref: 0065DEAA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ContainedObject
                                                      • String ID: AutoIt3GUI$Container
                                                      • API String ID: 3565006973-3941886329
                                                      • Opcode ID: e440f900708f1f1a868551126dcc911f989874c67629c3722e9ca93cea5449fc
                                                      • Instruction ID: f7fa10b4b42eb941c1e1f6f2eee2df08a6a98dd0ff36b1950543f40137ab3265
                                                      • Opcode Fuzzy Hash: e440f900708f1f1a868551126dcc911f989874c67629c3722e9ca93cea5449fc
                                                      • Instruction Fuzzy Hash: 5A913770600602AFDB64DF64C884A6ABBF6BF49711F10856EF84ACB791DB71E845CB60
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: _wcscpy
                                                      • String ID: I/i$I/i
                                                      • API String ID: 3048848545-1481515708
                                                      • Opcode ID: 88dfdb524e9d45900ed7a20722aa58de949687d2b7979f4fca71de7ff0cb1198
                                                      • Instruction ID: 0a652ab06750451fcc3c3dacc58035c7b25868f424554d921f39ce7e9ec73be8
                                                      • Opcode Fuzzy Hash: 88dfdb524e9d45900ed7a20722aa58de949687d2b7979f4fca71de7ff0cb1198
                                                      • Instruction Fuzzy Hash: B5410835900A17AACF25DFD9D4619FDB772EF48320F50504EF881A7295DB706E82C7A4
                                                      APIs
                                                      • Sleep.KERNEL32(00000000), ref: 0063BCDA
                                                      • GlobalMemoryStatusEx.KERNEL32 ref: 0063BCF3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: GlobalMemorySleepStatus
                                                      • String ID: @
                                                      • API String ID: 2783356886-2766056989
                                                      • Opcode ID: eca7eafaa49fa587fc432bf992761cb28550387906e3ced97332237c3f86aea7
                                                      • Instruction ID: 17b08716acb2dbc3f9ca8a35d615468e86a3364ed5472e893049f15340448087
                                                      • Opcode Fuzzy Hash: eca7eafaa49fa587fc432bf992761cb28550387906e3ced97332237c3f86aea7
                                                      • Instruction Fuzzy Hash: A45144714087469BE360AF14DC96BAFBBECFF94354F41484EF1C8810A2DB7085A88B96
                                                      APIs
                                                        • Part of subcall function 006244ED: __fread_nolock.LIBCMT ref: 0062450B
                                                      • _wcscmp.LIBCMT ref: 0066C65D
                                                      • _wcscmp.LIBCMT ref: 0066C670
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: _wcscmp$__fread_nolock
                                                      • String ID: FILE
                                                      • API String ID: 4029003684-3121273764
                                                      • Opcode ID: 91e9a537d859e56ea325b7d1624e90f598bb94b748937b37b6f807d100f19127
                                                      • Instruction ID: 6e38fd8f9d83d182cf8fa372954a3e6df17f0c218b7c08d225489439ad3d8244
                                                      • Opcode Fuzzy Hash: 91e9a537d859e56ea325b7d1624e90f598bb94b748937b37b6f807d100f19127
                                                      • Instruction Fuzzy Hash: EB41D672A0061ABADF60ABA4DC81FEF77FADF49714F000069F605EB181DA709A048B65
                                                      APIs
                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 0068A85A
                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0068A86F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: '
                                                      • API String ID: 3850602802-1997036262
                                                      • Opcode ID: 8446fceb61b4a8045cb6f7ed4bd1c998e05e13e7a3ea41deda6a8341d0e68269
                                                      • Instruction ID: 4b866547f1ef1ac5ae4ba5e97c67e82aaa0251065eb68b2e1d2c3fe88b781e94
                                                      • Opcode Fuzzy Hash: 8446fceb61b4a8045cb6f7ed4bd1c998e05e13e7a3ea41deda6a8341d0e68269
                                                      • Instruction Fuzzy Hash: 9941FA78E013099FEB54DFA4D881BDA7BBAFB09300F14116AED05AB341D770A942DFA1
                                                      APIs
                                                      • DestroyWindow.USER32(?,?,?,?), ref: 0068980E
                                                      • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0068984A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Window$DestroyMove
                                                      • String ID: static
                                                      • API String ID: 2139405536-2160076837
                                                      • Opcode ID: efc767be8f9f335e3797b981cb29d76f1095b32fd2dcdf51aa03dd1b9b5ab072
                                                      • Instruction ID: 4604be4be99f5c8b9a980a959109d73583b1e3f1701a9d56c68f41aaec896ead
                                                      • Opcode Fuzzy Hash: efc767be8f9f335e3797b981cb29d76f1095b32fd2dcdf51aa03dd1b9b5ab072
                                                      • Instruction Fuzzy Hash: 11318F71510605AEEB10AF74CC80BFB73AAFF59764F04961DF9A9C7290CA31AC81DB64
                                                      APIs
                                                      • _memset.LIBCMT ref: 006651C6
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00665201
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: InfoItemMenu_memset
                                                      • String ID: 0
                                                      • API String ID: 2223754486-4108050209
                                                      • Opcode ID: 35826aa23e5f0df48f4f5c132a270e49b2c240ca90212042b8cb11aa77a39cd8
                                                      • Instruction ID: 160eae411ee6f7da9220a068e82c995c57a3b8d025d32287a27df6c9d64aa000
                                                      • Opcode Fuzzy Hash: 35826aa23e5f0df48f4f5c132a270e49b2c240ca90212042b8cb11aa77a39cd8
                                                      • Instruction Fuzzy Hash: C631A271A007059BEB24CF99D896BEEBBFAFF45350F14401DE987A62A0E7709B44CB50
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: __snwprintf
                                                      • String ID: , $$AUTOITCALLVARIABLE%d
                                                      • API String ID: 2391506597-2584243854
                                                      • Opcode ID: 2dda394e61db1589a1fd6ad69e23520c51465d68d20cbe6d0071f739e1247877
                                                      • Instruction ID: 8aa5b8e4b0c5ecd79a83ea0ad7bd3def4b61b15bb87d70e54e7c405e6d55d3ce
                                                      • Opcode Fuzzy Hash: 2dda394e61db1589a1fd6ad69e23520c51465d68d20cbe6d0071f739e1247877
                                                      • Instruction Fuzzy Hash: C221BF71A00528ABCF50EF64D882EED77B6AF05740F40406DF405AB281DB70EA45CFAA
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0068945C
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00689467
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: Combobox
                                                      • API String ID: 3850602802-2096851135
                                                      • Opcode ID: 94df7183ba06b7f0547760ce85ef31242e1a9f5f8ccab426edd5a059ebf4ad9c
                                                      • Instruction ID: 2e383615132754ba9cd6e3fc1986ef3fa3f6c8fa098b5b25c81e9d3cd62dc6ec
                                                      • Opcode Fuzzy Hash: 94df7183ba06b7f0547760ce85ef31242e1a9f5f8ccab426edd5a059ebf4ad9c
                                                      • Instruction Fuzzy Hash: 9B1160713102097FEF21AE54DC80EFB37ABEB993A4F144229F9199B290D6719C528B70
                                                      APIs
                                                        • Part of subcall function 0063B34E: GetWindowLongW.USER32(?,000000EB), ref: 0063B35F
                                                      • GetActiveWindow.USER32 ref: 0068DA7B
                                                      • EnumChildWindows.USER32(?,0068D75F,00000000), ref: 0068DAF5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Window$ActiveChildEnumLongWindows
                                                      • String ID: T1g
                                                      • API String ID: 3814560230-2172628023
                                                      • Opcode ID: f0aaf8c8ae22aebb70055a7904266b44b685df742e3ab32a855b4d1a46ee5c0b
                                                      • Instruction ID: f9511573f8b3a49d7ac8e20b2548501e04dc3127b31e3c3210c9a1f72dc90ffe
                                                      • Opcode Fuzzy Hash: f0aaf8c8ae22aebb70055a7904266b44b685df742e3ab32a855b4d1a46ee5c0b
                                                      • Instruction Fuzzy Hash: 19211B75205341DFCB14EF68D890AA677E7EB5A320F25171DE96A8B3E0D730A840DF60
                                                      APIs
                                                        • Part of subcall function 0063D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 0063D1BA
                                                        • Part of subcall function 0063D17C: GetStockObject.GDI32(00000011), ref: 0063D1CE
                                                        • Part of subcall function 0063D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 0063D1D8
                                                      • GetWindowRect.USER32(00000000,?), ref: 00689968
                                                      • GetSysColor.USER32(00000012), ref: 00689982
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                      • String ID: static
                                                      • API String ID: 1983116058-2160076837
                                                      • Opcode ID: b60e4e4d0019b5afa69840b579a3fc4fda1e451fbfbe8e16808567f8f64abd52
                                                      • Instruction ID: 3c133c267dc7c38cd6ae8ae62c9577373fd60fc56c33950792e262bcb493b504
                                                      • Opcode Fuzzy Hash: b60e4e4d0019b5afa69840b579a3fc4fda1e451fbfbe8e16808567f8f64abd52
                                                      • Instruction Fuzzy Hash: 09116A72610209AFDF04EFB8CC45AFA7BA9FB09344F051619F956E3250D734E811DB60
                                                      APIs
                                                      • GetWindowTextLengthW.USER32(00000000), ref: 00689699
                                                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 006896A8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: LengthMessageSendTextWindow
                                                      • String ID: edit
                                                      • API String ID: 2978978980-2167791130
                                                      • Opcode ID: b63fe482d4205e1a3d2e82fc1f308fc98be1e19f61c9999e3b3cd4be24998877
                                                      • Instruction ID: d9ebad7179a2e8273056360d548a2c08ad69c151896dc36238e7c204abd11eb5
                                                      • Opcode Fuzzy Hash: b63fe482d4205e1a3d2e82fc1f308fc98be1e19f61c9999e3b3cd4be24998877
                                                      • Instruction Fuzzy Hash: A6116A71500208ABFF116FA4DC84AFB3B6BEB05378F144314F965972E0E731AC91AB60
                                                      APIs
                                                      • _memset.LIBCMT ref: 006652D5
                                                      • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 006652F4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: InfoItemMenu_memset
                                                      • String ID: 0
                                                      • API String ID: 2223754486-4108050209
                                                      • Opcode ID: a41eb357ce614d953741dab721614f8fd903d44981185896337a2313cadf44f5
                                                      • Instruction ID: 0790f47c816511b47b2b846c98e0dce0255124aedd1376eef2e367cfbe1e3611
                                                      • Opcode Fuzzy Hash: a41eb357ce614d953741dab721614f8fd903d44981185896337a2313cadf44f5
                                                      • Instruction Fuzzy Hash: DF11D375901714ABDB10DE98D946BD977AAAB06B54F040016E903BB390E3B0EE44C7D1
                                                      APIs
                                                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00674DF5
                                                      • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00674E1E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Internet$OpenOption
                                                      • String ID: <local>
                                                      • API String ID: 942729171-4266983199
                                                      • Opcode ID: c80ef4d41a08a9c05bb558272ef18fe444630cf29a502a85a175b14e12ec4521
                                                      • Instruction ID: b6d70815bb16abe79471af7760d00ea76975235573e63c8c1b4980db6465cfc6
                                                      • Opcode Fuzzy Hash: c80ef4d41a08a9c05bb558272ef18fe444630cf29a502a85a175b14e12ec4521
                                                      • Instruction Fuzzy Hash: 2A119E70501221FADB358B51888CEFBFAAAFF06764F10C22AF55956240DB70A941CAE0
                                                      APIs
                                                      • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 006537A7
                                                      • ___raise_securityfailure.LIBCMT ref: 0065388E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: FeaturePresentProcessor___raise_securityfailure
                                                      • String ID: (n
                                                      • API String ID: 3761405300-3602644056
                                                      • Opcode ID: 434fae98f57e633eab0907c9e472edecb4e82f934a39cb9c0a52137cbe752545
                                                      • Instruction ID: e7e05933747a0dc59ef8e8a3f0ce7b864a7bb58ea3d93dc1eb3dce04ab5fbee2
                                                      • Opcode Fuzzy Hash: 434fae98f57e633eab0907c9e472edecb4e82f934a39cb9c0a52137cbe752545
                                                      • Instruction Fuzzy Hash: 7F21CEB59013849AE750DF95EDDA6503BB7AB4C310F10682AE9048F3A0E3F469C4CB89
                                                      APIs
                                                      • inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 0067A84E
                                                      • htons.WSOCK32(00000000,?,00000000), ref: 0067A88B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: htonsinet_addr
                                                      • String ID: 255.255.255.255
                                                      • API String ID: 3832099526-2422070025
                                                      • Opcode ID: d5545d08cbb572449ba68bfa4ed0f4a3d711633387c8aa9c3c909730e20da1cf
                                                      • Instruction ID: 57e28d68deadce697cbaaa04f07100406cbbf88b31ded9989bbb7d79a6c3309d
                                                      • Opcode Fuzzy Hash: d5545d08cbb572449ba68bfa4ed0f4a3d711633387c8aa9c3c909730e20da1cf
                                                      • Instruction Fuzzy Hash: A701D275200304ABCB10AFA8D886FEDB766EF85320F10C42AF51A9B3D1D771E8068B56
                                                      APIs
                                                      • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 0065B7EF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 3850602802-1403004172
                                                      • Opcode ID: 82061406b1c976b3705edb121b1a05a560bb6f7dd6cf1be4f28da92c6fa31126
                                                      • Instruction ID: d037281430f062ab0155056ced63203a46002b048277521ce83ce21f30b29d04
                                                      • Opcode Fuzzy Hash: 82061406b1c976b3705edb121b1a05a560bb6f7dd6cf1be4f28da92c6fa31126
                                                      • Instruction Fuzzy Hash: 28012871601128ABCB44EBA4DC529FE336BBF15321F04061DF862973C1EB70580CCB94
                                                      APIs
                                                      • SendMessageW.USER32(?,00000180,00000000,?), ref: 0065B6EB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 3850602802-1403004172
                                                      • Opcode ID: feadaec688170cb5baad3239baa8b414fc067f596c364b9b97f6855c42b36e61
                                                      • Instruction ID: 4a11a9c074f9de88c5ed90e177d2d3e6a19bf0171f72a155e89c6acfea5a4905
                                                      • Opcode Fuzzy Hash: feadaec688170cb5baad3239baa8b414fc067f596c364b9b97f6855c42b36e61
                                                      • Instruction Fuzzy Hash: 8701A271A41015ABDB44EBA4D952AFF73AA9F15341F14001DB842B72C1EB905E1C8BB9
                                                      APIs
                                                      • SendMessageW.USER32(?,00000182,?,00000000), ref: 0065B76C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 3850602802-1403004172
                                                      • Opcode ID: 69be2685f03a634f44ea094d551aa4f6593f002f6155167c1931590915482fd6
                                                      • Instruction ID: 685471044cccd7a1fc907e07074fde1a2257aa61331c9065aa5c1b3a582b9816
                                                      • Opcode Fuzzy Hash: 69be2685f03a634f44ea094d551aa4f6593f002f6155167c1931590915482fd6
                                                      • Instruction Fuzzy Hash: 9501D671A40114BBDB40EBA4D952EFE73AE9B19341F14001DB842B32D2EBA05E0D8BB9
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: __calloc_crt
                                                      • String ID: "n
                                                      • API String ID: 3494438863-3918110435
                                                      • Opcode ID: 38622dc6b3587f18e8817d457faefba79e1587155a9bcd9a2f18f66c5989cc19
                                                      • Instruction ID: 5687ab8cb68418e94d29f158b70759bdc3b8b0b55a69f96e531fcd6e028a27d2
                                                      • Opcode Fuzzy Hash: 38622dc6b3587f18e8817d457faefba79e1587155a9bcd9a2f18f66c5989cc19
                                                      • Instruction Fuzzy Hash: 0FF0A471A097039EE7149F59BCA27A6679BEF04720B10451EF300CE294EB70C9414699
                                                      APIs
                                                      • LoadImageW.USER32(00620000,00000063,00000001,00000010,00000010,00000000), ref: 00624048
                                                      • EnumResourceNamesW.KERNEL32(00000000,0000000E,006667E9,00000063,00000000,75A90280,?,?,00623EE1,?,?,000000FF), ref: 006941B3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: EnumImageLoadNamesResource
                                                      • String ID: >b
                                                      • API String ID: 1578290342-105418645
                                                      • Opcode ID: e77d0c1804a839880ba4eee2a18f14c5d6047012784bc9f5a6640e53e4f0990a
                                                      • Instruction ID: 69001317d846932b7dfa14f52acdf389f4fe33bc576d68eff2f4723fab7fc5b4
                                                      • Opcode Fuzzy Hash: e77d0c1804a839880ba4eee2a18f14c5d6047012784bc9f5a6640e53e4f0990a
                                                      • Instruction Fuzzy Hash: 9EF0623164039077D7205B15FC86FD63A5B975ABB5F101506F225AE1D0D6F094C09A94
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: ClassName_wcscmp
                                                      • String ID: #32770
                                                      • API String ID: 2292705959-463685578
                                                      • Opcode ID: 3e1a2dd1f3da624bcab10093df8e76e656f30b900d4e774d786cea3ed7914b8c
                                                      • Instruction ID: 6d31d92696c436a22a86b2f4826a4e270a1a1d6cc2fa684b8512d91c8c8fa2d3
                                                      • Opcode Fuzzy Hash: 3e1a2dd1f3da624bcab10093df8e76e656f30b900d4e774d786cea3ed7914b8c
                                                      • Instruction Fuzzy Hash: BBE09277A0436427D710AAA59C49ECBFBADAB52764F01006AB905D7281E660E6418BD4
                                                      APIs
                                                      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 0065A63F
                                                        • Part of subcall function 006413F1: _doexit.LIBCMT ref: 006413FB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: Message_doexit
                                                      • String ID: AutoIt$Error allocating memory.
                                                      • API String ID: 1993061046-4017498283
                                                      • Opcode ID: 443eee3492d99312f12149f2f58125a31bce0329e404b21ff435a780f1feb3df
                                                      • Instruction ID: f368181ac01b3a4aaa211b867bc8d20db738b49ad525685a77eae7bc57f9eb32
                                                      • Opcode Fuzzy Hash: 443eee3492d99312f12149f2f58125a31bce0329e404b21ff435a780f1feb3df
                                                      • Instruction Fuzzy Hash: DDD05B313C472833D35536D97C17FC5754B9B16B61F05002ABF0D996C25DE6D98042DD
                                                      APIs
                                                      • GetSystemDirectoryW.KERNEL32(?), ref: 0069ACC0
                                                      • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 0069AEBD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: DirectoryFreeLibrarySystem
                                                      • String ID: WIN_XPe
                                                      • API String ID: 510247158-3257408948
                                                      • Opcode ID: 6d851329317c355620dd93232d325f4f6923f5e6d863d54a2bfd0ecc519329e9
                                                      • Instruction ID: 18ce4ef743dfb8e090a997d894a4e1ba3d824613c1204e124a5474d1765f69df
                                                      • Opcode Fuzzy Hash: 6d851329317c355620dd93232d325f4f6923f5e6d863d54a2bfd0ecc519329e9
                                                      • Instruction Fuzzy Hash: E4E06D70C00209DFCF11DBE4D984AECBBFEAB58300F109086E102B6A60CB305A85DF62
                                                      APIs
                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 006886E2
                                                      • PostMessageW.USER32(00000000), ref: 006886E9
                                                        • Part of subcall function 00667A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00667AD0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: FindMessagePostSleepWindow
                                                      • String ID: Shell_TrayWnd
                                                      • API String ID: 529655941-2988720461
                                                      • Opcode ID: f1d7886e108b1826269b565cd11419ba305bb4ba1d34d61cfb7e4797b780ecff
                                                      • Instruction ID: 54a308a87b9e1444e0b0635bb7488b13dd9bd30051c49164c6bfe89cab4fe7dc
                                                      • Opcode Fuzzy Hash: f1d7886e108b1826269b565cd11419ba305bb4ba1d34d61cfb7e4797b780ecff
                                                      • Instruction Fuzzy Hash: AAD012317853247BF3A87770AC0BFC67A1A9B05B11F111819B746EA2D0C9E0F940CB59
                                                      APIs
                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 006886A2
                                                      • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 006886B5
                                                        • Part of subcall function 00667A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00667AD0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2082475507.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                                                      • Associated: 00000000.00000002.2082451289.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006AD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082544922.00000000006CE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082608657.00000000006DA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2082634939.00000000006E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_620000_order and drawings_pdf.jbxd
                                                      Similarity
                                                      • API ID: FindMessagePostSleepWindow
                                                      • String ID: Shell_TrayWnd
                                                      • API String ID: 529655941-2988720461
                                                      • Opcode ID: 83f82513a47dcf36c9f10e8947f5ab96b271eb811d59f7f410154b35d257986c
                                                      • Instruction ID: 58a4254d978236f1b24f92d7630a86ca891b3c3b393445fcea03c9f160d6718e
                                                      • Opcode Fuzzy Hash: 83f82513a47dcf36c9f10e8947f5ab96b271eb811d59f7f410154b35d257986c
                                                      • Instruction Fuzzy Hash: 35D01231794324B7F3A87770AC0BFC67A1A9B05B11F111819B74AEA2D0C9E0F940CB54