Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
INVOICE NO. USF23-24072 IGR23110.exe

Overview

General Information

Sample name:INVOICE NO. USF23-24072 IGR23110.exe
Analysis ID:1572502
MD5:8f1fc72d3ee9e32761d1adb4df2653bb
SHA1:3964bbdef5772138a8676c009441a15e1ccd2d66
SHA256:6b72b7309b58b078cbca3445adad522360f9032bd607f1389d98f99ed0f7fafb
Tags:exeuser-lowmal3
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • INVOICE NO. USF23-24072 IGR23110.exe (PID: 2884 cmdline: "C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exe" MD5: 8F1FC72D3EE9E32761D1ADB4DF2653BB)
    • RegSvcs.exe (PID: 4196 cmdline: "C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.alltoursegypt.com", "Username": "admin@alltoursegypt.com", "Password": "OPldome23#12klein"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.4598348904.0000000003474000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000002.4597237290.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.4597237290.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.2128556752.0000000003490000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000002.2128556752.0000000003490000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            0.2.INVOICE NO. USF23-24072 IGR23110.exe.3490000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.INVOICE NO. USF23-24072 IGR23110.exe.3490000.1.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.INVOICE NO. USF23-24072 IGR23110.exe.3490000.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x34edb:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x34f4d:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x34fd7:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x35069:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x350d3:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x35145:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x351db:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x3526b:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 4 entries

                    System Summary

                    barindex
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 192.254.186.165, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 4196, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49709
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 2.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.alltoursegypt.com", "Username": "admin@alltoursegypt.com", "Password": "OPldome23#12klein"}
                    Source: INVOICE NO. USF23-24072 IGR23110.exeReversingLabs: Detection: 50%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: INVOICE NO. USF23-24072 IGR23110.exeJoe Sandbox ML: detected
                    Source: INVOICE NO. USF23-24072 IGR23110.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.6:49707 version: TLS 1.2
                    Source: Binary string: wntdll.pdbUGP source: INVOICE NO. USF23-24072 IGR23110.exe, 00000000.00000003.2121865849.0000000003820000.00000004.00001000.00020000.00000000.sdmp, INVOICE NO. USF23-24072 IGR23110.exe, 00000000.00000003.2126570572.0000000003A10000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: INVOICE NO. USF23-24072 IGR23110.exe, 00000000.00000003.2121865849.0000000003820000.00000004.00001000.00020000.00000000.sdmp, INVOICE NO. USF23-24072 IGR23110.exe, 00000000.00000003.2126570572.0000000003A10000.00000004.00001000.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005E445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_005E445A
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005EC6D1 FindFirstFileW,FindClose,0_2_005EC6D1
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005EC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_005EC75C
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005EEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_005EEF95
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005EF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_005EF0F2
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005EF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_005EF3F3
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005E37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_005E37EF
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005E3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_005E3B12
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005EBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_005EBCBC
                    Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                    Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                    Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005F22EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_005F22EE
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: mail.alltoursegypt.com
                    Source: RegSvcs.exe, 00000002.00000002.4598348904.00000000034FB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598348904.000000000346C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://alltoursegypt.com
                    Source: RegSvcs.exe, 00000002.00000002.4598348904.00000000034FB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598348904.000000000346C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.alltoursegypt.com
                    Source: RegSvcs.exe, 00000002.00000002.4598348904.0000000003474000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598348904.00000000034FB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4600188483.000000000685C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4600029380.00000000067D0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4597968115.0000000001726000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.i.lencr.org/01
                    Source: RegSvcs.exe, 00000002.00000002.4598348904.0000000003474000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598348904.00000000034FB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4600188483.000000000685C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4600029380.00000000067D0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4597968115.0000000001726000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r10.o.lencr.org0#
                    Source: RegSvcs.exe, 00000002.00000002.4598348904.00000000033F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: RegSvcs.exe, 00000002.00000002.4598348904.0000000003474000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598348904.00000000034FB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4600188483.000000000685C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4600029380.00000000067D0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4597968115.0000000001726000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                    Source: RegSvcs.exe, 00000002.00000002.4598348904.0000000003474000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598348904.00000000034FB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4600188483.000000000685C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4600029380.00000000067D0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4597968115.0000000001726000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                    Source: INVOICE NO. USF23-24072 IGR23110.exe, 00000000.00000002.2128556752.0000000003490000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4597237290.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: INVOICE NO. USF23-24072 IGR23110.exe, 00000000.00000002.2128556752.0000000003490000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598348904.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4597237290.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.ipify.org
                    Source: RegSvcs.exe, 00000002.00000002.4598348904.00000000033F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: RegSvcs.exe, 00000002.00000002.4598348904.00000000033F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.6:49707 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.INVOICE NO. USF23-24072 IGR23110.exe.3490000.1.raw.unpack, NmHr1WHWKO.cs.Net Code: lhg
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005F4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_005F4164
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005F4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_005F4164
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005F3F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_005F3F66
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005E001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_005E001C
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_0060CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0060CABC

                    System Summary

                    barindex
                    Source: 0.2.INVOICE NO. USF23-24072 IGR23110.exe.3490000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.INVOICE NO. USF23-24072 IGR23110.exe.3490000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000000.00000002.2128556752.0000000003490000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: This is a third-party compiled AutoIt script.0_2_00583B3A
                    Source: INVOICE NO. USF23-24072 IGR23110.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                    Source: INVOICE NO. USF23-24072 IGR23110.exe, 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_b58caf39-9
                    Source: INVOICE NO. USF23-24072 IGR23110.exe, 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_bcb3801b-8
                    Source: INVOICE NO. USF23-24072 IGR23110.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_d27432c6-8
                    Source: INVOICE NO. USF23-24072 IGR23110.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_2e58187f-2
                    Source: initial sampleStatic PE information: Filename: INVOICE NO. USF23-24072 IGR23110.exe
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005EA1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_005EA1EF
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005D8310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_005D8310
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005E51BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_005E51BD
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005AD9750_2_005AD975
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005A21C50_2_005A21C5
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005B62D20_2_005B62D2
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_006003DA0_2_006003DA
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005B242E0_2_005B242E
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005A25FA0_2_005A25FA
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005DE6160_2_005DE616
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005966E10_2_005966E1
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_0058E6A00_2_0058E6A0
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005B878F0_2_005B878F
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005B68440_2_005B6844
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_006008570_2_00600857
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005988080_2_00598808
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005E88890_2_005E8889
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005ACB210_2_005ACB21
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005B6DB60_2_005B6DB6
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_00596F9E0_2_00596F9E
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005930300_2_00593030
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005AF1D90_2_005AF1D9
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005A31870_2_005A3187
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005812870_2_00581287
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005A14840_2_005A1484
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005955200_2_00595520
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005A76960_2_005A7696
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005957600_2_00595760
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005A19780_2_005A1978
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005B9AB50_2_005B9AB5
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_0058FCE00_2_0058FCE0
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_00607DDB0_2_00607DDB
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005A1D900_2_005A1D90
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005ABDA60_2_005ABDA6
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_0058DF000_2_0058DF00
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_00593FE00_2_00593FE0
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_00F998100_2_00F99810
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0163A1B02_2_0163A1B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0163A9782_2_0163A978
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_01634A982_2_01634A98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_01633E802_2_01633E80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_016341C82_2_016341C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0163F9C82_2_0163F9C8
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: String function: 00587DE1 appears 35 times
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: String function: 005A0AE3 appears 70 times
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: String function: 005A8900 appears 42 times
                    Source: INVOICE NO. USF23-24072 IGR23110.exe, 00000000.00000003.2123697553.0000000003B3D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs INVOICE NO. USF23-24072 IGR23110.exe
                    Source: INVOICE NO. USF23-24072 IGR23110.exe, 00000000.00000002.2128556752.0000000003490000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename106790a0-b81d-4bde-9832-48ebd9bb7fec.exe4 vs INVOICE NO. USF23-24072 IGR23110.exe
                    Source: INVOICE NO. USF23-24072 IGR23110.exe, 00000000.00000003.2123184913.0000000003993000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs INVOICE NO. USF23-24072 IGR23110.exe
                    Source: INVOICE NO. USF23-24072 IGR23110.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: 0.2.INVOICE NO. USF23-24072 IGR23110.exe.3490000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.INVOICE NO. USF23-24072 IGR23110.exe.3490000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000000.00000002.2128556752.0000000003490000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.INVOICE NO. USF23-24072 IGR23110.exe.3490000.1.raw.unpack, ISZbPXDvPz.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.INVOICE NO. USF23-24072 IGR23110.exe.3490000.1.raw.unpack, ISZbPXDvPz.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.INVOICE NO. USF23-24072 IGR23110.exe.3490000.1.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.INVOICE NO. USF23-24072 IGR23110.exe.3490000.1.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.INVOICE NO. USF23-24072 IGR23110.exe.3490000.1.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.INVOICE NO. USF23-24072 IGR23110.exe.3490000.1.raw.unpack, nAXAT51m.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.INVOICE NO. USF23-24072 IGR23110.exe.3490000.1.raw.unpack, YpS.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.INVOICE NO. USF23-24072 IGR23110.exe.3490000.1.raw.unpack, YpS.csCryptographic APIs: 'TransformFinalBlock'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@2/2
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005EA06A GetLastError,FormatMessageW,0_2_005EA06A
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005D81CB AdjustTokenPrivileges,CloseHandle,0_2_005D81CB
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005D87E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_005D87E1
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005EB333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_005EB333
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005FEE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_005FEE0D
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005EC397 CoInitialize,CoCreateInstance,CoUninitialize,0_2_005EC397
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_00584E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00584E89
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeFile created: C:\Users\user\AppData\Local\Temp\aut3D4.tmpJump to behavior
                    Source: INVOICE NO. USF23-24072 IGR23110.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: INVOICE NO. USF23-24072 IGR23110.exeReversingLabs: Detection: 50%
                    Source: unknownProcess created: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exe "C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exe"
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exe"
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: INVOICE NO. USF23-24072 IGR23110.exeStatic file information: File size 1067520 > 1048576
                    Source: INVOICE NO. USF23-24072 IGR23110.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: INVOICE NO. USF23-24072 IGR23110.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: INVOICE NO. USF23-24072 IGR23110.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: INVOICE NO. USF23-24072 IGR23110.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: INVOICE NO. USF23-24072 IGR23110.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: INVOICE NO. USF23-24072 IGR23110.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: INVOICE NO. USF23-24072 IGR23110.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: wntdll.pdbUGP source: INVOICE NO. USF23-24072 IGR23110.exe, 00000000.00000003.2121865849.0000000003820000.00000004.00001000.00020000.00000000.sdmp, INVOICE NO. USF23-24072 IGR23110.exe, 00000000.00000003.2126570572.0000000003A10000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: INVOICE NO. USF23-24072 IGR23110.exe, 00000000.00000003.2121865849.0000000003820000.00000004.00001000.00020000.00000000.sdmp, INVOICE NO. USF23-24072 IGR23110.exe, 00000000.00000003.2126570572.0000000003A10000.00000004.00001000.00020000.00000000.sdmp
                    Source: INVOICE NO. USF23-24072 IGR23110.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: INVOICE NO. USF23-24072 IGR23110.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: INVOICE NO. USF23-24072 IGR23110.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: INVOICE NO. USF23-24072 IGR23110.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: INVOICE NO. USF23-24072 IGR23110.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_00584B37 LoadLibraryA,GetProcAddress,0_2_00584B37
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005A8945 push ecx; ret 0_2_005A8958
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_01630C45 push ebx; retf 2_2_01630C52
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_01630C53 push ebx; retf 2_2_01630C52
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_01630CCB push edi; retf 2_2_01630C7A
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005848D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_005848D7
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_00605376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00605376
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005A3187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_005A3187
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeAPI/Special instruction interceptor: Address: F99434
                    Source: INVOICE NO. USF23-24072 IGR23110.exe, 00000000.00000002.2128115651.000000000101D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXE?[Q
                    Source: INVOICE NO. USF23-24072 IGR23110.exe, 00000000.00000002.2127846188.0000000000F18000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXER
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2916Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 6927Jump to behavior
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeAPI coverage: 4.7 %
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005E445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_005E445A
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005EC6D1 FindFirstFileW,FindClose,0_2_005EC6D1
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005EC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_005EC75C
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005EEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_005EEF95
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005EF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_005EF0F2
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005EF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_005EF3F3
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005E37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_005E37EF
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005E3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_005E3B12
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005EBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_005EBCBC
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005849A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005849A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99890Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99781Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99671Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99562Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99451Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99343Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99196Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99091Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98954Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98687Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98542Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98328Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98218Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98109Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97999Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97890Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97781Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97671Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97562Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97453Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97343Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97234Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97124Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97015Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96906Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96795Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96687Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96578Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96468Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96359Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96249Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96128Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95887Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95729Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95554Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95438Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95312Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95203Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95093Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94984Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94874Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94764Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94656Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94546Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94437Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94328Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94218Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 94109Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 93999Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 93890Jump to behavior
                    Source: RegSvcs.exe, 00000002.00000002.4600029380.00000000067D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll:
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeAPI call chain: ExitProcess graph end nodegraph_0-100776
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeAPI call chain: ExitProcess graph end nodegraph_0-100994
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005F3F09 BlockInput,0_2_005F3F09
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_00583B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00583B3A
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005B5A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_005B5A7C
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_00584B37 LoadLibraryA,GetProcAddress,0_2_00584B37
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_00F98040 mov eax, dword ptr fs:[00000030h]0_2_00F98040
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_00F996A0 mov eax, dword ptr fs:[00000030h]0_2_00F996A0
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_00F99700 mov eax, dword ptr fs:[00000030h]0_2_00F99700
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005D80A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_005D80A9
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005AA155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005AA155
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005AA124 SetUnhandledExceptionFilter,0_2_005AA124
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1136008Jump to behavior
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005D87B1 LogonUserW,0_2_005D87B1
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_00583B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00583B3A
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005848D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_005848D7
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005E4C53 mouse_event,0_2_005E4C53
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005D7CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_005D7CAF
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005D874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_005D874B
                    Source: INVOICE NO. USF23-24072 IGR23110.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                    Source: INVOICE NO. USF23-24072 IGR23110.exeBinary or memory string: Shell_TrayWnd
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005A862B cpuid 0_2_005A862B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005B4E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_005B4E87
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005C1E06 GetUserNameW,0_2_005C1E06
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005B3F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_005B3F3A
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005849A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005849A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.INVOICE NO. USF23-24072 IGR23110.exe.3490000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.INVOICE NO. USF23-24072 IGR23110.exe.3490000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.4598348904.0000000003474000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4597237290.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2128556752.0000000003490000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4598348904.000000000346C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4598348904.0000000003441000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: INVOICE NO. USF23-24072 IGR23110.exe PID: 2884, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4196, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqliteJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: INVOICE NO. USF23-24072 IGR23110.exeBinary or memory string: WIN_81
                    Source: INVOICE NO. USF23-24072 IGR23110.exeBinary or memory string: WIN_XP
                    Source: INVOICE NO. USF23-24072 IGR23110.exeBinary or memory string: WIN_XPe
                    Source: INVOICE NO. USF23-24072 IGR23110.exeBinary or memory string: WIN_VISTA
                    Source: INVOICE NO. USF23-24072 IGR23110.exeBinary or memory string: WIN_7
                    Source: INVOICE NO. USF23-24072 IGR23110.exeBinary or memory string: WIN_8
                    Source: INVOICE NO. USF23-24072 IGR23110.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                    Source: Yara matchFile source: 0.2.INVOICE NO. USF23-24072 IGR23110.exe.3490000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.INVOICE NO. USF23-24072 IGR23110.exe.3490000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.4597237290.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2128556752.0000000003490000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4598348904.0000000003441000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: INVOICE NO. USF23-24072 IGR23110.exe PID: 2884, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4196, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.INVOICE NO. USF23-24072 IGR23110.exe.3490000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.INVOICE NO. USF23-24072 IGR23110.exe.3490000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.4598348904.0000000003474000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4597237290.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2128556752.0000000003490000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4598348904.000000000346C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4598348904.0000000003441000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: INVOICE NO. USF23-24072 IGR23110.exe PID: 2884, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4196, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005F6283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_005F6283
                    Source: C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exeCode function: 0_2_005F6747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_005F6747
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure2
                    Valid Accounts
                    121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    2
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts1
                    Native API
                    2
                    Valid Accounts
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    221
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    11
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                    Valid Accounts
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    2
                    File and Directory Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    NTDS138
                    System Information Discovery
                    Distributed Component Object Model221
                    Input Capture
                    13
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                    Process Injection
                    2
                    Valid Accounts
                    LSA Secrets341
                    Security Software Discovery
                    SSH3
                    Clipboard Data
                    Fallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts121
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials121
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                    Access Token Manipulation
                    DCSync2
                    Process Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                    Process Injection
                    Proc Filesystem11
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                    System Network Configuration Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    INVOICE NO. USF23-24072 IGR23110.exe50%ReversingLabsWin32.Trojan.AutoitInject
                    INVOICE NO. USF23-24072 IGR23110.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://mail.alltoursegypt.com0%Avira URL Cloudsafe
                    http://alltoursegypt.com0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    api.ipify.org
                    104.26.13.205
                    truefalse
                      high
                      alltoursegypt.com
                      192.254.186.165
                      truetrue
                        unknown
                        mail.alltoursegypt.com
                        unknown
                        unknowntrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          https://api.ipify.org/false
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://mail.alltoursegypt.comRegSvcs.exe, 00000002.00000002.4598348904.00000000034FB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598348904.000000000346C000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://api.ipify.orgINVOICE NO. USF23-24072 IGR23110.exe, 00000000.00000002.2128556752.0000000003490000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598348904.00000000033F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4597237290.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                              high
                              http://r10.o.lencr.org0#RegSvcs.exe, 00000002.00000002.4598348904.0000000003474000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598348904.00000000034FB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4600188483.000000000685C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4600029380.00000000067D0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4597968115.0000000001726000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://r10.i.lencr.org/01RegSvcs.exe, 00000002.00000002.4598348904.0000000003474000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598348904.00000000034FB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4600188483.000000000685C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4600029380.00000000067D0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4597968115.0000000001726000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://account.dyn.com/INVOICE NO. USF23-24072 IGR23110.exe, 00000000.00000002.2128556752.0000000003490000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4597237290.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                    high
                                    https://api.ipify.org/tRegSvcs.exe, 00000002.00000002.4598348904.00000000033F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.4598348904.00000000033F1000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://x1.c.lencr.org/0RegSvcs.exe, 00000002.00000002.4598348904.0000000003474000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598348904.00000000034FB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4600188483.000000000685C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4600029380.00000000067D0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4597968115.0000000001726000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://x1.i.lencr.org/0RegSvcs.exe, 00000002.00000002.4598348904.0000000003474000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598348904.00000000034FB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4600188483.000000000685C000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4600029380.00000000067D0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4597968115.0000000001726000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://alltoursegypt.comRegSvcs.exe, 00000002.00000002.4598348904.00000000034FB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4598348904.000000000346C000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            104.26.13.205
                                            api.ipify.orgUnited States
                                            13335CLOUDFLARENETUSfalse
                                            192.254.186.165
                                            alltoursegypt.comUnited States
                                            46606UNIFIEDLAYER-AS-1UStrue
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1572502
                                            Start date and time:2024-12-10 16:30:06 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 7m 54s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:9
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:INVOICE NO. USF23-24072 IGR23110.exe
                                            Detection:MAL
                                            Classification:mal100.troj.spyw.evad.winEXE@3/4@2/2
                                            EGA Information:
                                            • Successful, ratio: 50%
                                            HCA Information:
                                            • Successful, ratio: 100%
                                            • Number of executed functions: 59
                                            • Number of non-executed functions: 276
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                                            • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                                            • Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.175.87.197
                                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Execution Graph export aborted for target RegSvcs.exe, PID 4196 because it is empty
                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                                            • VT rate limit hit for: INVOICE NO. USF23-24072 IGR23110.exe
                                            TimeTypeDescription
                                            10:31:00API Interceptor10415657x Sleep call for process: RegSvcs.exe modified
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            104.26.13.205BiXS3FRoLe.exeGet hashmaliciousTrojanRansomBrowse
                                            • api.ipify.org/
                                            lEUy79aLAW.exeGet hashmaliciousTrojanRansomBrowse
                                            • api.ipify.org/
                                            Simple1.exeGet hashmaliciousUnknownBrowse
                                            • api.ipify.org/
                                            2b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
                                            • api.ipify.org/
                                            file.exeGet hashmaliciousUnknownBrowse
                                            • api.ipify.org/
                                            file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                            • api.ipify.org/
                                            file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                            • api.ipify.org/
                                            file.exeGet hashmaliciousRDPWrap ToolBrowse
                                            • api.ipify.org/
                                            Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                                            • api.ipify.org/
                                            file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                            • api.ipify.org/
                                            192.254.186.165Shipping Documents 72908672134.exeGet hashmaliciousAgentTeslaBrowse
                                              PUK ITALIA PO 120610549.EXE.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                api.ipify.orgSPECIFICATIONS.exeGet hashmaliciousAgentTeslaBrowse
                                                • 104.26.13.205
                                                EEMsLiXoiTzoaDd.scrGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 172.67.74.152
                                                Statement 2024-11-29 (K07234).exeGet hashmaliciousAgentTeslaBrowse
                                                • 104.26.12.205
                                                Employee_Letter.pdfGet hashmaliciousHTMLPhisherBrowse
                                                • 104.26.13.205
                                                1mr7lpFIVI.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.12.205
                                                jKDBppzWTb.exeGet hashmaliciousAgentTeslaBrowse
                                                • 172.67.74.152
                                                enyi.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 104.26.13.205
                                                proforma invoice.exeGet hashmaliciousAgentTeslaBrowse
                                                • 104.26.13.205
                                                x.ps1Get hashmaliciousPureLog Stealer, QuasarBrowse
                                                • 104.26.12.205
                                                file.exeGet hashmaliciousQuasarBrowse
                                                • 104.26.13.205
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                CLOUDFLARENETUSSPECIFICATIONS.exeGet hashmaliciousAgentTeslaBrowse
                                                • 104.26.13.205
                                                ST07933.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 104.21.67.152
                                                fiyati_teklif 65TIBBI20_ Memorial Medikal Cihaz Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 172.67.177.134
                                                http://abercombie.comGet hashmaliciousUnknownBrowse
                                                • 104.18.86.42
                                                https://listafrica.org/Receipt.htmlGet hashmaliciousWinSearchAbuseBrowse
                                                • 172.64.41.3
                                                https://github.com/Matty77o/malware-samples-m-h/blob/main/TheTrueFriend.exeGet hashmaliciousUnknownBrowse
                                                • 162.159.135.232
                                                https://wetransfer.com/downloads/a83584fea59b11ef1e94d36869e8790020241209234540/89744b9472f9ce1b5e3b4ada79f2184c20241209234540/7041ff?t_exp=1734047140&t_lsid=42d44d78-6d8f-48db-8db5-5efa0c86786d&t_network=email&t_rid=ZW1haWx8Njc0ZjQ5YTNiNjM1NTFjNmY2NTg0N2Zj&t_s=download_link&t_ts=1733787940&utm_campaign=TRN_TDL_01&utm_source=sendgrid&utm_medium=email&trk=TRN_TDL_01Get hashmaliciousUnknownBrowse
                                                • 104.26.1.90
                                                https://webradiojaguar.net/FNB-POP.pdfGet hashmaliciousUnknownBrowse
                                                • 1.1.1.1
                                                PO2412010.exeGet hashmaliciousFormBookBrowse
                                                • 104.21.64.1
                                                https://zfrmz.com/wE0Jw9HNvGeKZ1fn5cBUGet hashmaliciousUnknownBrowse
                                                • 104.17.25.14
                                                UNIFIEDLAYER-AS-1USSPECIFICATIONS.exeGet hashmaliciousAgentTeslaBrowse
                                                • 192.254.225.136
                                                ExternalREMITTANCE ACH SCHEDULED 1210241424bec0c449d38092c0dbd844252d73 (24.0 KB).msgGet hashmaliciousUnknownBrowse
                                                • 69.49.245.172
                                                la.bot.arm6.elfGet hashmaliciousMiraiBrowse
                                                • 162.215.31.89
                                                la.bot.powerpc.elfGet hashmaliciousMiraiBrowse
                                                • 198.58.93.231
                                                https://xxx.cloudlawservices.com/fROBJ/Get hashmaliciousHTMLPhisherBrowse
                                                • 69.49.230.198
                                                Play_VM-NowCRQW.htmlGet hashmaliciousHTMLPhisherBrowse
                                                • 69.49.230.198
                                                https://webservice.ucampaign.unear.net/UmailTracking/t.aspx?p=64620006&c=MTI2NjMxOA==&up=46435316&e=jlim@vvblawyers.com&l=MTczODQ=&i=1126&u=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Get hashmaliciousHTMLPhisherBrowse
                                                • 192.185.25.241
                                                http://crissertaoericardo.com.br/images/document.pif.rarGet hashmaliciousGuLoaderBrowse
                                                • 192.185.217.125
                                                https://mpleho.com/wd/Get hashmaliciousPhisherBrowse
                                                • 69.49.234.173
                                                AWB_5771388044 Documente de expediere.exeGet hashmaliciousFormBookBrowse
                                                • 108.179.253.197
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                3b5074b1b5d032e5620f69f9f700ff0eSPECIFICATIONS.exeGet hashmaliciousAgentTeslaBrowse
                                                • 104.26.13.205
                                                ST07933.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 104.26.13.205
                                                fiyati_teklif 65TIBBI20_ Memorial Medikal Cihaz Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 104.26.13.205
                                                Ref_31020563.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.13.205
                                                Ref_31020563.exeGet hashmaliciousUnknownBrowse
                                                • 104.26.13.205
                                                xUPaeKk5wQ.msiGet hashmaliciousAteraAgentBrowse
                                                • 104.26.13.205
                                                7gBUqzSN3y.msiGet hashmaliciousAteraAgentBrowse
                                                • 104.26.13.205
                                                PO-8776-2024.jsGet hashmaliciousRemcosBrowse
                                                • 104.26.13.205
                                                New Order Enquiry.jsGet hashmaliciousAgentTeslaBrowse
                                                • 104.26.13.205
                                                Bunker_STS_pdf.vbsGet hashmaliciousUnknownBrowse
                                                • 104.26.13.205
                                                No context
                                                Process:C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):159638
                                                Entropy (8bit):7.94161914525211
                                                Encrypted:false
                                                SSDEEP:3072:CbkVs/W5hvJ6+gLoSX2zi+QPoq2JJ+ShTjpNgSPaMoZgdgq3m:C4Vs/oI+IoLzAAqfSNpNg8C3q2
                                                MD5:488BC5C2E4A0EA835D3CD7CE90346465
                                                SHA1:739011331959ECA2841459FF4943874E958059A6
                                                SHA-256:BE44A4B30D6AE3160DD46893894D5FC3335397A5373BD124C3182ACFC44AA372
                                                SHA-512:FC674BAB388E31DA175B50C880A49D4025FE8BA1D00938D8DF166D1A83DD2C012F3B17EE9B42E4182C51B17B0AFE14545F7C20D6681FC3DE624A56448778AD65
                                                Malicious:false
                                                Reputation:low
                                                Preview:EA06.........ej.T..f.]/>.F......Z..4..r...V..J5D._5...q......7.{........5..!4.O.2*.z3'.......c1......fUf..`q..ZA?...[...l..5F.Q.L....s]Z.bcO....l.sD..9...Mj....cE../4J...\..\`....P..U.. ...Q .J5BC3......j.D...P.?...f....wS:$......(......S.....V.....q.T/ ...j..p.q....38.....\l..@....#.J&......i.Tj.....V....5F....k....Q.......Q.T.(~.l......x...-...*S...!....J.N...U+S...7../.V..._.............]....B..)...7L..}m.~.@.v..m..I@..&~Z]....Q..,.q....4]'.=....4.]^}..]k.].Cw.`.6y,.7......'w.1.w'T[O.......-.....L ..o.w..M....U@.H..Y.^.K...z.........'..8.F.q....m.Jc?....y..a....98..+....<..g. ..V..O.9...1/.E"@..T....~.@..n..Z.........=...@.n.E+~.s..8..4oif....ZFjI..ZsZ.D....C..>.&s.........."..FM3.E-.:=^.U..'.z........Z.&cP.M..Z..z..2..U....q...[...r..|ik5n......y@s.F......0.....9.X..&.M,.J.N.!..RyU.7...b.YE~x......].Vh.9.No}..(...._k..h.Je....C...\.aD.^h...b...VjW..bZ.xO....r.n..fs:5cOP.S.UY=.5...s...3.P......M......!..Q.4...D.......~..m5Z...F..../..L
                                                Process:C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):14636
                                                Entropy (8bit):7.6294422433662685
                                                Encrypted:false
                                                SSDEEP:384:ITYznwBBBovI7dbhz2j6ovJO7vTRSc0SkQVVJSRgIB:IAwrBoQphAvRcJMaW
                                                MD5:18C43D81C3A29F8F2B6DE0C14E1C0972
                                                SHA1:98D697293462E6C804F3C5DC65501685EDFB5211
                                                SHA-256:C4B888AC896BFD7E086AC809FD2F3E5DB856C6C45433E1BDBD834FC580884318
                                                SHA-512:3E377ECBAB9F8DAB97947AAFC7B484D498FBF4A132791E19D07FB371EE6690710B1463ABF28C29C8BDB6B19E282196E532EC4779AC5EB6B66D36136003E89C09
                                                Malicious:false
                                                Reputation:low
                                                Preview:EA06..0..[.....+x..f....... .V......71...@.x..L.......*.`......8............`.......Z|3@...@.........K.X@0.2.Z..Z>)..w.e....l !..m..;...| !.....;....;.....l.;.0./.<.;...m..rd.....@->.....4....f.C.5..;.............r.....X.<>`.O..p.........!.........h.=..........<|3.....c...h.. -...... ...X.Z?......(...(.G..4.h....x....M@N.......Z?.I.......N@R... ...5.(..,.._...k`........R...._.K..?d...B.... 7W.......n.../.~.....)...@...!K....h|!._....ga._.5.1.....`v/.......NA*...,...7.7.,..!6.b...Z?.K(-...0.h..&.._....' -.............-..........G.6.....d_.T......"....d_.(M..57....n.....`...L....K.L..6.s.A.?..L.......Bg>...w.36.... !...L...}....|V.4..r......$............r..9....>.....2... ...b....`......k.(.....!`....,......V1`..f....X.>i.v'.3c.........G.4....E.?......9..X.......7...l.`..."...\.61*........f.....|.`.O.......,`........nl,....C.`....p...Y......`....@n?..;g....0...d...l ...P.?'....}...........0...4.X...>y.....1......x...L.\.i.....)...@n?............b...@.>y...
                                                Process:C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exe
                                                File Type:ASCII text, with very long lines (65536), with no line terminators
                                                Category:dropped
                                                Size (bytes):143378
                                                Entropy (8bit):2.993594682206911
                                                Encrypted:false
                                                SSDEEP:96:AIXLr46+F05BvDMo3I+0FlPFpA6Fxcg+GcuD9IlycuS3wrWVjjJqnBaAJZdjureP:H3NjwPOhGcuD9IlycuS3wrWVhqnBaA
                                                MD5:CDD1D3A70B00DE957C239DFFFF68BBB6
                                                SHA1:D3B4EDF37E27DF830BE8FAF3CD28362B2E9D2EAD
                                                SHA-256:F5243FFF9519BCA3EE79AD7B81C11C9E03FB48D373E81613F4BCFBD7EB30C451
                                                SHA-512:07C71B08BBDAF852E7C2E60F97686CC89FD698353387C4B1593CBBF57C8D4C7EDD577F40AF353A1464A838A25772978EAD6800C3BA4A8819B1C931D2DC9991BB
                                                Malicious:false
                                                Reputation:low
                                                Preview:dowp0dowpxdowp5dowp5dowp8dowpbdowpedowpcdowp8dowp1dowpedowpcdowpcdowpcdowp0dowp2dowp0dowp0dowp0dowp0dowp5dowp6dowp5dowp7dowpbdowp8dowp6dowpbdowp0dowp0dowp0dowp0dowp0dowp0dowp6dowp6dowp8dowp9dowp4dowp5dowp8dowp4dowpbdowp9dowp6dowp5dowp0dowp0dowp0dowp0dowp0dowp0dowp6dowp6dowp8dowp9dowp4dowpddowp8dowp6dowpbdowpadowp7dowp2dowp0dowp0dowp0dowp0dowp0dowp0dowp6dowp6dowp8dowp9dowp5dowp5dowp8dowp8dowpbdowp8dowp6dowpedowp0dowp0dowp0dowp0dowp0dowp0dowp6dowp6dowp8dowp9dowp4dowp5dowp8dowpadowpbdowp9dowp6dowp5dowp0dowp0dowp0dowp0dowp0dowp0dowp6dowp6dowp8dowp9dowp4dowpddowp8dowpcdowpbdowpadowp6dowpcdowp0dowp0dowp0dowp0dowp0dowp0dowp6dowp6dowp8dowp9dowp5dowp5dowp8dowpedowpbdowp8dowp3dowp3dowp0dowp0dowp0dowp0dowp0dowp0dowp6dowp6dowp8dowp9dowp4dowp5dowp9dowp0dowpbdowp9dowp3dowp2dowp0dowp0dowp0dowp0dowp0dowp0dowp6dowp6dowp8dowp9dowp4dowpddowp9dowp2dowpbdowpadowp2dowpedowp0dowp0dowp0dowp0dowp0dowp0dowp6dowp6dowp8dowp9dowp5dowp5dowp9dowp4dowpbdowp8dowp6dowp4dowp0dowp0dowp0dowp0dowp0dowp0dowp6dowp6dowp8dowp9
                                                Process:C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):247296
                                                Entropy (8bit):6.736120444191032
                                                Encrypted:false
                                                SSDEEP:6144:5vEeHHLX6WwUu2zrBvs3no66xSh70dX/Hz6:5ZHHL8Uu2zrBvsXpyShSfO
                                                MD5:6CE23D04DE22B81CBD6A684F1198DBE7
                                                SHA1:0FCC331CAA1D12EB956093AF84F0EFC038B6E9F2
                                                SHA-256:F0A4241C97BAF6F46D7F89B3B3628593268CDC70EA596526A6AD3CC82863A683
                                                SHA-512:CC583E71394F90E9649E45DC75C576E2D612EF0D74E39283D896235D723FF22561CD4E30003CA3ABE933B0A55A0B56C078A8E13AFBDCD9633201A9C4C0614BCA
                                                Malicious:false
                                                Reputation:low
                                                Preview:...QLZSTGM5U..DF.FP139DZ.VQOZSTCM5UZ0DFQFP139DZYVQOZSTCM5UZ0.FQF^..7D.P.p.[..b.]<).44>!"P^.';78>;z11c?@;zY*f....^V ?w[\E~STCM5UZ`.FQ.Q23M.<VQOZSTCM.UX1OGZFP.09DRYVQOZS.N5Uz0DF.EP13yDZyVQOXSTGM5UZ0DFUFP139DZYvUOZQTCM5UZ2D..FP!39TZYVQ_ZSDCM5UZ0TFQFP139DZYV9.YS.CM5U.3D.TFP139DZYVQOZSTCM5UZ0@F]FP139DZYVQOZSTCM5UZ0DFQFP139DZYVQOZSTCM5UZ0DFQFP139DzYVYOZSTCM5UZ0DNqFPy39DZYVQOZSTm9P-.0DF..S13.DZY.ROZQTCM5UZ0DFQFP13.DZ9x#<(0TCMsPZ0D.RFP739D.ZVQOZSTCM5UZ0D.QF..A\(5:VQCZSTCM1UZ2DFQ.S139DZYVQOZSTC.5U.0DFQFP139DZYVQOZ.@M5UZ0.FQFR169..[VEt[SWCM5TZ0BFQFP139DZYVQOZSTCM5UZ0DFQFP139DZYVQOZSTCM5UZ0DFQ[......g.,qP1S.k.2.3..B..H.vK.L.*[...@...a$@.x3.Kj..F...8.]_IE.....YO+W>.8u\5.P....yg%...5W. ...1h.:Ei.|...`r....60....;..7, .4*@(#..1WRK-.[.POZST........8>.k.:KDmD)....y'-....8P13]DZY$QOZ2TCMrUZ0+FQF>139:ZYV/OZS.CM5.Z0DqQFP.39D7YVQkZST=M5U.MKI...X@..ZYVQOo..s.X.....f...H.$.4i...0...._c.I9.'r.~..W.$..C.&3v.hCGWBU34=GVdX....uAI1PX7@E]{^z...{.p.c..<..c>.-FP139D.YV.OZS..M.UZ0.F.F.39D.V.O.S...5
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Entropy (8bit):7.016905362657233
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:INVOICE NO. USF23-24072 IGR23110.exe
                                                File size:1'067'520 bytes
                                                MD5:8f1fc72d3ee9e32761d1adb4df2653bb
                                                SHA1:3964bbdef5772138a8676c009441a15e1ccd2d66
                                                SHA256:6b72b7309b58b078cbca3445adad522360f9032bd607f1389d98f99ed0f7fafb
                                                SHA512:801b47b8162b310328e332e86a7a5b5bbf7b72c03bddda03ec41a5c328757c64fbd52f5cbd095ef9124a33e22ad13b2223f35accbf79a8a7749db6fff6ea57d1
                                                SSDEEP:24576:6u6J33O0c+JY5UZ+XC0kGso6FarZQNnTbshRXwDxTiWY:Mu0c++OCvkGs9FarZGnvskVY
                                                TLSH:6935BE2273DDC360CB669173BF6AB7017EBF78614630B85B2F880D7DA950162162D7A3
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                                Icon Hash:aaf3e3e3938382a0
                                                Entrypoint:0x427dcd
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x6757ADDB [Tue Dec 10 02:56:27 2024 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:5
                                                OS Version Minor:1
                                                File Version Major:5
                                                File Version Minor:1
                                                Subsystem Version Major:5
                                                Subsystem Version Minor:1
                                                Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                Instruction
                                                call 00007FCDB0D1A58Ah
                                                jmp 00007FCDB0D0D354h
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                int3
                                                push edi
                                                push esi
                                                mov esi, dword ptr [esp+10h]
                                                mov ecx, dword ptr [esp+14h]
                                                mov edi, dword ptr [esp+0Ch]
                                                mov eax, ecx
                                                mov edx, ecx
                                                add eax, esi
                                                cmp edi, esi
                                                jbe 00007FCDB0D0D4DAh
                                                cmp edi, eax
                                                jc 00007FCDB0D0D83Eh
                                                bt dword ptr [004C31FCh], 01h
                                                jnc 00007FCDB0D0D4D9h
                                                rep movsb
                                                jmp 00007FCDB0D0D7ECh
                                                cmp ecx, 00000080h
                                                jc 00007FCDB0D0D6A4h
                                                mov eax, edi
                                                xor eax, esi
                                                test eax, 0000000Fh
                                                jne 00007FCDB0D0D4E0h
                                                bt dword ptr [004BE324h], 01h
                                                jc 00007FCDB0D0D9B0h
                                                bt dword ptr [004C31FCh], 00000000h
                                                jnc 00007FCDB0D0D67Dh
                                                test edi, 00000003h
                                                jne 00007FCDB0D0D68Eh
                                                test esi, 00000003h
                                                jne 00007FCDB0D0D66Dh
                                                bt edi, 02h
                                                jnc 00007FCDB0D0D4DFh
                                                mov eax, dword ptr [esi]
                                                sub ecx, 04h
                                                lea esi, dword ptr [esi+04h]
                                                mov dword ptr [edi], eax
                                                lea edi, dword ptr [edi+04h]
                                                bt edi, 03h
                                                jnc 00007FCDB0D0D4E3h
                                                movq xmm1, qword ptr [esi]
                                                sub ecx, 08h
                                                lea esi, dword ptr [esi+08h]
                                                movq qword ptr [edi], xmm1
                                                lea edi, dword ptr [edi+08h]
                                                test esi, 00000007h
                                                je 00007FCDB0D0D535h
                                                bt esi, 03h
                                                jnc 00007FCDB0D0D588h
                                                Programming Language:
                                                • [ASM] VS2013 build 21005
                                                • [ C ] VS2013 build 21005
                                                • [C++] VS2013 build 21005
                                                • [ C ] VS2008 SP1 build 30729
                                                • [IMP] VS2008 SP1 build 30729
                                                • [ASM] VS2013 UPD4 build 31101
                                                • [RES] VS2013 build 21005
                                                • [LNK] VS2013 UPD4 build 31101
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x3c0ac.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1040000x711c.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0xc70000x3c0ac0x3c200a9e553d79602c07143a8f4892c137d7cFalse0.8899996751559252data7.804927150735573IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0x1040000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                                RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                                RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                                RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                                RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                                RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                RT_RCDATA0xcf7b80x33374data1.000338449804557
                                                RT_GROUP_ICON0x102b2c0x76dataEnglishGreat Britain0.6610169491525424
                                                RT_GROUP_ICON0x102ba40x14dataEnglishGreat Britain1.25
                                                RT_GROUP_ICON0x102bb80x14dataEnglishGreat Britain1.15
                                                RT_GROUP_ICON0x102bcc0x14dataEnglishGreat Britain1.25
                                                RT_VERSION0x102be00xdcdataEnglishGreat Britain0.6181818181818182
                                                RT_MANIFEST0x102cbc0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                DLLImport
                                                WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                PSAPI.DLLGetProcessMemoryInfo
                                                IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                UxTheme.dllIsThemeActive
                                                KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishGreat Britain
                                                TimestampSource PortDest PortSource IPDest IP
                                                Dec 10, 2024 16:30:59.084523916 CET49707443192.168.2.6104.26.13.205
                                                Dec 10, 2024 16:30:59.084578991 CET44349707104.26.13.205192.168.2.6
                                                Dec 10, 2024 16:30:59.084654093 CET49707443192.168.2.6104.26.13.205
                                                Dec 10, 2024 16:30:59.098597050 CET49707443192.168.2.6104.26.13.205
                                                Dec 10, 2024 16:30:59.098630905 CET44349707104.26.13.205192.168.2.6
                                                Dec 10, 2024 16:31:00.327152967 CET44349707104.26.13.205192.168.2.6
                                                Dec 10, 2024 16:31:00.327295065 CET49707443192.168.2.6104.26.13.205
                                                Dec 10, 2024 16:31:00.331748009 CET49707443192.168.2.6104.26.13.205
                                                Dec 10, 2024 16:31:00.331758022 CET44349707104.26.13.205192.168.2.6
                                                Dec 10, 2024 16:31:00.332065105 CET44349707104.26.13.205192.168.2.6
                                                Dec 10, 2024 16:31:00.382637024 CET49707443192.168.2.6104.26.13.205
                                                Dec 10, 2024 16:31:00.385401964 CET49707443192.168.2.6104.26.13.205
                                                Dec 10, 2024 16:31:00.431344986 CET44349707104.26.13.205192.168.2.6
                                                Dec 10, 2024 16:31:00.771522045 CET44349707104.26.13.205192.168.2.6
                                                Dec 10, 2024 16:31:00.771583080 CET44349707104.26.13.205192.168.2.6
                                                Dec 10, 2024 16:31:00.771677971 CET49707443192.168.2.6104.26.13.205
                                                Dec 10, 2024 16:31:00.777595043 CET49707443192.168.2.6104.26.13.205
                                                Dec 10, 2024 16:31:02.225817919 CET49709587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:02.345843077 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:02.346838951 CET49709587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:03.563936949 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:03.564223051 CET49709587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:03.683613062 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:03.933329105 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:03.933556080 CET49709587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:04.053381920 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:04.320590019 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:04.321125984 CET49709587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:04.441595078 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:04.697359085 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:04.697504044 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:04.697510958 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:04.697592974 CET49709587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:04.714478970 CET49709587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:04.834217072 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:05.080815077 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:05.132620096 CET49709587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:05.144998074 CET49709587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:05.265642881 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:05.512510061 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:05.522357941 CET49709587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:05.641602993 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:05.889512062 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:05.894212961 CET49709587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:06.016861916 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:06.323050022 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:06.323339939 CET49709587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:06.442735910 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:06.689057112 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:06.689879894 CET49709587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:06.813528061 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:07.072756052 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:07.075015068 CET49709587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:07.194885015 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:07.441435099 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:07.442004919 CET49709587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:07.442054987 CET49709587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:07.442076921 CET49709587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:07.442090034 CET49709587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:07.565371037 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:07.565457106 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:07.565665960 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:07.565769911 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:07.870400906 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:07.913826942 CET49709587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:07.925573111 CET49709587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:08.049488068 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:08.302810907 CET58749709192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:08.304941893 CET49709587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:08.329132080 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:08.452136040 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:08.452295065 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:09.693429947 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:09.693618059 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:09.814821005 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:10.065458059 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:10.065675020 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:10.185520887 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:10.433116913 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:10.433617115 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:10.552961111 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:10.816917896 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:10.817120075 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:10.817126989 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:10.817218065 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:10.818758011 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:10.939469099 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:11.206837893 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:11.207988024 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:11.329091072 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:11.576476097 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:11.576983929 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:11.696439981 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:11.943671942 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:11.943928957 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:12.066242933 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:12.325453043 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:12.325697899 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:12.446293116 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:12.694267988 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:12.694555044 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:12.814254999 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:13.072896957 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:13.073369980 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:13.195785046 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:13.446688890 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:13.448030949 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:13.448110104 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:13.448142052 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:13.448177099 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:13.448221922 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:13.448256969 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:13.448291063 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:13.448317051 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:13.448340893 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:13.448364973 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:31:13.569062948 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:13.569087029 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:13.569125891 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:13.569165945 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:13.569428921 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:13.569482088 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:13.569494009 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:13.569535971 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:13.569570065 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:13.569577932 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:13.823426008 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:31:13.866920948 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:32:41.304776907 CET49716587192.168.2.6192.254.186.165
                                                Dec 10, 2024 16:32:41.425180912 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:32:41.670620918 CET58749716192.254.186.165192.168.2.6
                                                Dec 10, 2024 16:32:41.671109915 CET49716587192.168.2.6192.254.186.165
                                                TimestampSource PortDest PortSource IPDest IP
                                                Dec 10, 2024 16:30:58.940233946 CET6533553192.168.2.61.1.1.1
                                                Dec 10, 2024 16:30:59.077147961 CET53653351.1.1.1192.168.2.6
                                                Dec 10, 2024 16:31:01.284091949 CET5014453192.168.2.61.1.1.1
                                                Dec 10, 2024 16:31:02.207304955 CET53501441.1.1.1192.168.2.6
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Dec 10, 2024 16:30:58.940233946 CET192.168.2.61.1.1.10x7f64Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                Dec 10, 2024 16:31:01.284091949 CET192.168.2.61.1.1.10x35dcStandard query (0)mail.alltoursegypt.comA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Dec 10, 2024 16:30:59.077147961 CET1.1.1.1192.168.2.60x7f64No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                Dec 10, 2024 16:30:59.077147961 CET1.1.1.1192.168.2.60x7f64No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                Dec 10, 2024 16:30:59.077147961 CET1.1.1.1192.168.2.60x7f64No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                Dec 10, 2024 16:31:02.207304955 CET1.1.1.1192.168.2.60x35dcNo error (0)mail.alltoursegypt.comalltoursegypt.comCNAME (Canonical name)IN (0x0001)false
                                                Dec 10, 2024 16:31:02.207304955 CET1.1.1.1192.168.2.60x35dcNo error (0)alltoursegypt.com192.254.186.165A (IP address)IN (0x0001)false
                                                • api.ipify.org
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.649707104.26.13.2054434196C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                TimestampBytes transferredDirectionData
                                                2024-12-10 15:31:00 UTC155OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                Host: api.ipify.org
                                                Connection: Keep-Alive
                                                2024-12-10 15:31:00 UTC423INHTTP/1.1 200 OK
                                                Date: Tue, 10 Dec 2024 15:31:00 GMT
                                                Content-Type: text/plain
                                                Content-Length: 12
                                                Connection: close
                                                Vary: Origin
                                                CF-Cache-Status: DYNAMIC
                                                Server: cloudflare
                                                CF-RAY: 8efe4788bb3e0f3e-EWR
                                                server-timing: cfL4;desc="?proto=TCP&rtt=1483&min_rtt=1483&rtt_var=741&sent=6&recv=8&lost=0&retrans=1&sent_bytes=4180&recv_bytes=769&delivery_rate=398907&cwnd=213&unsent_bytes=0&cid=27444107f54f3e84&ts=463&x=0"
                                                2024-12-10 15:31:00 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 31 37 35
                                                Data Ascii: 8.46.123.175


                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                Dec 10, 2024 16:31:03.563936949 CET58749709192.254.186.165192.168.2.6220-gator3170.hostgator.com ESMTP Exim 4.96.2 #2 Tue, 10 Dec 2024 09:31:03 -0600
                                                220-We do not authorize the use of this system to transport unsolicited,
                                                220 and/or bulk e-mail.
                                                Dec 10, 2024 16:31:03.564223051 CET49709587192.168.2.6192.254.186.165EHLO 128757
                                                Dec 10, 2024 16:31:03.933329105 CET58749709192.254.186.165192.168.2.6250-gator3170.hostgator.com Hello 128757 [8.46.123.175]
                                                250-SIZE 52428800
                                                250-8BITMIME
                                                250-PIPELINING
                                                250-PIPECONNECT
                                                250-AUTH PLAIN LOGIN
                                                250-STARTTLS
                                                250 HELP
                                                Dec 10, 2024 16:31:03.933556080 CET49709587192.168.2.6192.254.186.165STARTTLS
                                                Dec 10, 2024 16:31:04.320590019 CET58749709192.254.186.165192.168.2.6220 TLS go ahead
                                                Dec 10, 2024 16:31:09.693429947 CET58749716192.254.186.165192.168.2.6220-gator3170.hostgator.com ESMTP Exim 4.96.2 #2 Tue, 10 Dec 2024 09:31:09 -0600
                                                220-We do not authorize the use of this system to transport unsolicited,
                                                220 and/or bulk e-mail.
                                                Dec 10, 2024 16:31:09.693618059 CET49716587192.168.2.6192.254.186.165EHLO 128757
                                                Dec 10, 2024 16:31:10.065458059 CET58749716192.254.186.165192.168.2.6250-gator3170.hostgator.com Hello 128757 [8.46.123.175]
                                                250-SIZE 52428800
                                                250-8BITMIME
                                                250-PIPELINING
                                                250-PIPECONNECT
                                                250-AUTH PLAIN LOGIN
                                                250-STARTTLS
                                                250 HELP
                                                Dec 10, 2024 16:31:10.065675020 CET49716587192.168.2.6192.254.186.165STARTTLS
                                                Dec 10, 2024 16:31:10.433116913 CET58749716192.254.186.165192.168.2.6220 TLS go ahead

                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:10:30:55
                                                Start date:10/12/2024
                                                Path:C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exe"
                                                Imagebase:0x580000
                                                File size:1'067'520 bytes
                                                MD5 hash:8F1FC72D3EE9E32761D1ADB4DF2653BB
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2128556752.0000000003490000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2128556752.0000000003490000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.2128556752.0000000003490000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                Reputation:low
                                                Has exited:true

                                                Target ID:2
                                                Start time:10:30:56
                                                Start date:10/12/2024
                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\INVOICE NO. USF23-24072 IGR23110.exe"
                                                Imagebase:0xf80000
                                                File size:45'984 bytes
                                                MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4598348904.0000000003474000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4597237290.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4597237290.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4598348904.000000000346C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4598348904.0000000003441000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4598348904.0000000003441000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:high
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:4%
                                                  Dynamic/Decrypted Code Coverage:0.4%
                                                  Signature Coverage:4.7%
                                                  Total number of Nodes:2000
                                                  Total number of Limit Nodes:47
                                                  execution_graph 100718 58552a 100725 585ab8 100718->100725 100724 58555a Mailbox 100744 5a0db6 100725->100744 100727 585acb 100728 5a0db6 Mailbox 59 API calls 100727->100728 100729 58553c 100728->100729 100730 5854d2 100729->100730 100782 5858cf 100730->100782 100733 585514 100733->100724 100736 588061 MultiByteToWideChar 100733->100736 100735 5854e3 100735->100733 100789 585bc0 100735->100789 100795 585a7a 100735->100795 100737 5880ce 100736->100737 100738 588087 100736->100738 100824 587d8c 100737->100824 100739 5a0db6 Mailbox 59 API calls 100738->100739 100741 58809c MultiByteToWideChar 100739->100741 100812 58774d 100741->100812 100743 5880c0 100743->100724 100747 5a0dbe 100744->100747 100746 5a0dd8 100746->100727 100747->100746 100749 5a0ddc std::exception::exception 100747->100749 100754 5a571c 100747->100754 100771 5a33a1 DecodePointer 100747->100771 100772 5a859b RaiseException 100749->100772 100751 5a0e06 100773 5a84d1 58 API calls _free 100751->100773 100753 5a0e18 100753->100727 100755 5a5797 100754->100755 100764 5a5728 100754->100764 100780 5a33a1 DecodePointer 100755->100780 100757 5a579d 100781 5a8b28 58 API calls __getptd_noexit 100757->100781 100760 5a575b RtlAllocateHeap 100761 5a578f 100760->100761 100760->100764 100761->100747 100763 5a5783 100778 5a8b28 58 API calls __getptd_noexit 100763->100778 100764->100760 100764->100763 100765 5a5733 100764->100765 100769 5a5781 100764->100769 100777 5a33a1 DecodePointer 100764->100777 100765->100764 100774 5aa16b 58 API calls __NMSG_WRITE 100765->100774 100775 5aa1c8 58 API calls 5 library calls 100765->100775 100776 5a309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 100765->100776 100779 5a8b28 58 API calls __getptd_noexit 100769->100779 100771->100747 100772->100751 100773->100753 100774->100765 100775->100765 100777->100764 100778->100769 100779->100761 100780->100757 100781->100761 100783 5bdc3c 100782->100783 100784 5858e0 100782->100784 100804 5d5ecd 59 API calls Mailbox 100783->100804 100784->100735 100786 5bdc46 100787 5a0db6 Mailbox 59 API calls 100786->100787 100788 5bdc52 100787->100788 100790 585c33 100789->100790 100793 585bce 100789->100793 100805 585c4e SetFilePointerEx 100790->100805 100792 585bf6 100792->100735 100793->100792 100794 585c06 ReadFile 100793->100794 100794->100792 100794->100793 100796 5bdcee 100795->100796 100797 585a8e 100795->100797 100811 5d5ecd 59 API calls Mailbox 100796->100811 100806 5859b9 100797->100806 100800 585a9a 100800->100735 100801 5bdcf9 100802 5a0db6 Mailbox 59 API calls 100801->100802 100803 5bdd0e _memmove 100802->100803 100804->100786 100805->100793 100807 5859d1 100806->100807 100810 5859ca _memmove 100806->100810 100808 5a0db6 Mailbox 59 API calls 100807->100808 100809 5bdc7e 100807->100809 100808->100810 100810->100800 100811->100801 100813 58775c 100812->100813 100814 5877cf 100812->100814 100813->100814 100816 587768 100813->100816 100832 587d2c 100814->100832 100817 5877a0 100816->100817 100818 587772 100816->100818 100829 588029 100817->100829 100828 587f27 59 API calls Mailbox 100818->100828 100821 58777a _memmove 100821->100743 100822 5877aa 100823 5a0db6 Mailbox 59 API calls 100822->100823 100823->100821 100825 587da6 100824->100825 100827 587d99 100824->100827 100826 5a0db6 Mailbox 59 API calls 100825->100826 100826->100827 100827->100743 100828->100821 100830 5a0db6 Mailbox 59 API calls 100829->100830 100831 588033 100830->100831 100831->100822 100833 587d3a 100832->100833 100835 587d43 _memmove 100832->100835 100833->100835 100836 587e4f 100833->100836 100835->100821 100837 587e62 100836->100837 100839 587e5f _memmove 100836->100839 100838 5a0db6 Mailbox 59 API calls 100837->100838 100838->100839 100839->100835 100840 58e5ab 100843 58d100 100840->100843 100842 58e5b9 100844 58d11d 100843->100844 100871 58d37d 100843->100871 100845 5c26e0 100844->100845 100846 5c2691 100844->100846 100870 58d144 100844->100870 100918 5fa3e6 341 API calls __cinit 100845->100918 100847 5c2694 100846->100847 100856 5c26af 100846->100856 100850 5c26a0 100847->100850 100847->100870 100916 5fa9fa 341 API calls 100850->100916 100854 5c28b5 100854->100854 100855 58d54b 100855->100842 100856->100871 100917 5faea2 341 API calls 3 library calls 100856->100917 100857 58d434 100907 588a52 68 API calls 100857->100907 100861 5c27fc 100926 5fa751 89 API calls 100861->100926 100862 58d443 100862->100842 100870->100855 100870->100857 100870->100861 100870->100871 100877 589ea0 100870->100877 100901 588740 68 API calls __cinit 100870->100901 100902 588542 68 API calls 100870->100902 100903 5884c0 100870->100903 100908 58843a 68 API calls 100870->100908 100909 58cf7c 341 API calls 100870->100909 100910 589dda 59 API calls Mailbox 100870->100910 100911 5a2d40 100870->100911 100914 58cf00 89 API calls 100870->100914 100915 58cd7d 341 API calls 100870->100915 100919 588a52 68 API calls 100870->100919 100920 589d3c 60 API calls Mailbox 100870->100920 100921 5d678d 60 API calls 100870->100921 100922 588047 100870->100922 100871->100855 100927 5e9e4a 89 API calls 4 library calls 100871->100927 100878 589ebf 100877->100878 100887 589eed Mailbox 100877->100887 100879 5a0db6 Mailbox 59 API calls 100878->100879 100879->100887 100880 58b475 100881 588047 59 API calls 100880->100881 100890 58a057 100881->100890 100882 58b47a 100883 5c09e5 100882->100883 100884 5c0055 100882->100884 100933 5e9e4a 89 API calls 4 library calls 100883->100933 100930 5e9e4a 89 API calls 4 library calls 100884->100930 100885 5a0db6 59 API calls Mailbox 100885->100887 100887->100880 100887->100882 100887->100884 100887->100885 100887->100890 100894 588047 59 API calls 100887->100894 100895 587667 59 API calls 100887->100895 100896 5a2d40 67 API calls __cinit 100887->100896 100897 5d6e8f 59 API calls 100887->100897 100898 5c09d6 100887->100898 100900 58a55a 100887->100900 100928 58c8c0 341 API calls 2 library calls 100887->100928 100929 58b900 60 API calls Mailbox 100887->100929 100890->100870 100891 5c0064 100891->100870 100894->100887 100895->100887 100896->100887 100897->100887 100932 5e9e4a 89 API calls 4 library calls 100898->100932 100931 5e9e4a 89 API calls 4 library calls 100900->100931 100901->100870 100902->100870 100904 5884cb 100903->100904 100905 5884f2 100904->100905 100934 5889b3 69 API calls Mailbox 100904->100934 100905->100870 100907->100862 100908->100870 100909->100870 100910->100870 100935 5a2c44 100911->100935 100913 5a2d4b 100913->100870 100914->100870 100915->100870 100916->100855 100917->100871 100918->100870 100919->100870 100920->100870 100921->100870 100923 58805a 100922->100923 100924 588052 100922->100924 100923->100870 101019 587f77 59 API calls 2 library calls 100924->101019 100926->100871 100927->100854 100928->100887 100929->100887 100930->100891 100931->100890 100932->100883 100933->100890 100934->100905 100936 5a2c50 _fseek 100935->100936 100943 5a3217 100936->100943 100942 5a2c77 _fseek 100942->100913 100960 5a9c0b 100943->100960 100945 5a2c59 100946 5a2c88 DecodePointer DecodePointer 100945->100946 100947 5a2c65 100946->100947 100948 5a2cb5 100946->100948 100957 5a2c82 100947->100957 100948->100947 101012 5a87a4 59 API calls __wtof_l 100948->101012 100950 5a2d18 EncodePointer EncodePointer 100950->100947 100951 5a2cec 100951->100947 100955 5a2d06 EncodePointer 100951->100955 101014 5a8864 61 API calls 2 library calls 100951->101014 100952 5a2cc7 100952->100950 100952->100951 101013 5a8864 61 API calls 2 library calls 100952->101013 100955->100950 100956 5a2d00 100956->100947 100956->100955 101015 5a3220 100957->101015 100961 5a9c2f EnterCriticalSection 100960->100961 100962 5a9c1c 100960->100962 100961->100945 100967 5a9c93 100962->100967 100964 5a9c22 100964->100961 100991 5a30b5 58 API calls 3 library calls 100964->100991 100968 5a9c9f _fseek 100967->100968 100969 5a9ca8 100968->100969 100970 5a9cc0 100968->100970 100992 5aa16b 58 API calls __NMSG_WRITE 100969->100992 100983 5a9ce1 _fseek 100970->100983 100995 5a881d 100970->100995 100972 5a9cad 100993 5aa1c8 58 API calls 5 library calls 100972->100993 100976 5a9cb4 100994 5a309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 100976->100994 100977 5a9ceb 100981 5a9c0b __lock 58 API calls 100977->100981 100978 5a9cdc 101001 5a8b28 58 API calls __getptd_noexit 100978->101001 100984 5a9cf2 100981->100984 100983->100964 100985 5a9cff 100984->100985 100986 5a9d17 100984->100986 101002 5a9e2b InitializeCriticalSectionAndSpinCount 100985->101002 101003 5a2d55 100986->101003 100989 5a9d0b 101009 5a9d33 LeaveCriticalSection _doexit 100989->101009 100992->100972 100993->100976 100997 5a882b 100995->100997 100996 5a571c __crtLCMapStringA_stat 58 API calls 100996->100997 100997->100996 100998 5a885d 100997->100998 101000 5a883e 100997->101000 100998->100977 100998->100978 101000->100997 101000->100998 101010 5aa132 Sleep 101000->101010 101001->100983 101002->100989 101004 5a2d5e RtlFreeHeap 101003->101004 101008 5a2d87 __dosmaperr 101003->101008 101005 5a2d73 101004->101005 101004->101008 101011 5a8b28 58 API calls __getptd_noexit 101005->101011 101007 5a2d79 GetLastError 101007->101008 101008->100989 101009->100983 101010->101000 101011->101007 101012->100952 101013->100951 101014->100956 101018 5a9d75 LeaveCriticalSection 101015->101018 101017 5a2c87 101017->100942 101018->101017 101019->100923 101020 58107d 101025 58708b 101020->101025 101022 58108c 101023 5a2d40 __cinit 67 API calls 101022->101023 101024 581096 101023->101024 101026 58709b __ftell_nolock 101025->101026 101056 587667 101026->101056 101030 58715a 101068 5a050b 101030->101068 101037 587667 59 API calls 101038 58718b 101037->101038 101039 587d8c 59 API calls 101038->101039 101040 587194 RegOpenKeyExW 101039->101040 101041 5be8b1 RegQueryValueExW 101040->101041 101045 5871b6 Mailbox 101040->101045 101042 5be8ce 101041->101042 101043 5be943 RegCloseKey 101041->101043 101044 5a0db6 Mailbox 59 API calls 101042->101044 101043->101045 101051 5be955 _wcscat Mailbox __NMSG_WRITE 101043->101051 101046 5be8e7 101044->101046 101045->101022 101087 58522e 101046->101087 101049 5be90f 101090 587bcc 101049->101090 101051->101045 101052 5879f2 59 API calls 101051->101052 101055 583f74 59 API calls 101051->101055 101099 587de1 101051->101099 101052->101051 101053 5be929 101053->101043 101055->101051 101057 5a0db6 Mailbox 59 API calls 101056->101057 101058 587688 101057->101058 101059 5a0db6 Mailbox 59 API calls 101058->101059 101060 587151 101059->101060 101061 584706 101060->101061 101103 5b1940 101061->101103 101064 587de1 59 API calls 101065 584739 101064->101065 101105 584750 101065->101105 101067 584743 Mailbox 101067->101030 101069 5b1940 __ftell_nolock 101068->101069 101070 5a0518 GetFullPathNameW 101069->101070 101071 5a053a 101070->101071 101072 587bcc 59 API calls 101071->101072 101073 587165 101072->101073 101074 587cab 101073->101074 101075 5bed4a 101074->101075 101076 587cbf 101074->101076 101078 588029 59 API calls 101075->101078 101119 587c50 101076->101119 101080 5bed55 __NMSG_WRITE _memmove 101078->101080 101079 587173 101081 583f74 101079->101081 101082 583f82 101081->101082 101086 583fa4 _memmove 101081->101086 101084 5a0db6 Mailbox 59 API calls 101082->101084 101083 5a0db6 Mailbox 59 API calls 101085 583fb8 101083->101085 101084->101086 101085->101037 101086->101083 101088 5a0db6 Mailbox 59 API calls 101087->101088 101089 585240 RegQueryValueExW 101088->101089 101089->101049 101089->101053 101091 587bd8 __NMSG_WRITE 101090->101091 101092 587c45 101090->101092 101094 587bee 101091->101094 101095 587c13 101091->101095 101093 587d2c 59 API calls 101092->101093 101098 587bf6 _memmove 101093->101098 101124 587f27 59 API calls Mailbox 101094->101124 101097 588029 59 API calls 101095->101097 101097->101098 101098->101053 101100 587df0 __NMSG_WRITE _memmove 101099->101100 101101 5a0db6 Mailbox 59 API calls 101100->101101 101102 587e2e 101101->101102 101102->101051 101104 584713 GetModuleFileNameW 101103->101104 101104->101064 101106 5b1940 __ftell_nolock 101105->101106 101107 58475d GetFullPathNameW 101106->101107 101108 584799 101107->101108 101109 58477c 101107->101109 101111 587d8c 59 API calls 101108->101111 101110 587bcc 59 API calls 101109->101110 101112 584788 101110->101112 101111->101112 101115 587726 101112->101115 101116 587734 101115->101116 101117 587d2c 59 API calls 101116->101117 101118 584794 101117->101118 101118->101067 101120 587c5f __NMSG_WRITE 101119->101120 101121 588029 59 API calls 101120->101121 101122 587c70 _memmove 101120->101122 101123 5bed07 _memmove 101121->101123 101122->101079 101124->101098 101125 58b40e 101133 59f944 101125->101133 101127 58b424 101142 58c5a7 101127->101142 101129 58b44c 101130 58a388 101129->101130 101154 5e9e4a 89 API calls 4 library calls 101129->101154 101132 5c08e9 101134 59f950 101133->101134 101135 59f962 101133->101135 101155 589d3c 60 API calls Mailbox 101134->101155 101137 59f968 101135->101137 101138 59f991 101135->101138 101140 5a0db6 Mailbox 59 API calls 101137->101140 101156 589d3c 60 API calls Mailbox 101138->101156 101141 59f95a 101140->101141 101141->101127 101157 587a16 101142->101157 101144 58c5cc _wcscmp 101145 587de1 59 API calls 101144->101145 101148 58c600 Mailbox 101144->101148 101146 5c1691 101145->101146 101162 587b2e 101146->101162 101148->101129 101151 5c16ad 101153 5c16b1 Mailbox 101151->101153 101172 589d3c 60 API calls Mailbox 101151->101172 101153->101129 101154->101132 101155->101141 101156->101141 101158 5a0db6 Mailbox 59 API calls 101157->101158 101159 587a3b 101158->101159 101160 588029 59 API calls 101159->101160 101161 587a4a 101160->101161 101161->101144 101163 5bec6b 101162->101163 101164 587b40 101162->101164 101179 5d7bdb 59 API calls _memmove 101163->101179 101173 587a51 101164->101173 101167 587b4c 101171 58843a 68 API calls 101167->101171 101168 5bec75 101169 588047 59 API calls 101168->101169 101170 5bec7d Mailbox 101169->101170 101171->101151 101172->101153 101174 587a5f 101173->101174 101178 587a85 _memmove 101173->101178 101175 5a0db6 Mailbox 59 API calls 101174->101175 101174->101178 101176 587ad4 101175->101176 101177 5a0db6 Mailbox 59 API calls 101176->101177 101177->101178 101178->101167 101179->101168 101180 5bfdfc 101181 58ab30 Mailbox _memmove 101180->101181 101185 5a0db6 59 API calls Mailbox 101181->101185 101204 587de1 59 API calls 101181->101204 101205 58a057 101181->101205 101209 589f37 Mailbox 101181->101209 101213 58b2b6 101181->101213 101214 589ea0 341 API calls 101181->101214 101216 5c086a 101181->101216 101218 5c0878 101181->101218 101220 5c085c 101181->101220 101221 58b21c 101181->101221 101225 58b525 101181->101225 101226 5d6e8f 59 API calls 101181->101226 101230 5ed07b 101181->101230 101277 5fdf23 101181->101277 101280 591fc3 101181->101280 101320 5fc2e0 101181->101320 101352 5e7956 101181->101352 101358 5fbc6b 101181->101358 101398 5d617e 101181->101398 101403 589c90 59 API calls Mailbox 101181->101403 101407 5fc193 85 API calls 2 library calls 101181->101407 101183 5d617e Mailbox 59 API calls 101183->101205 101185->101181 101188 5a0db6 59 API calls Mailbox 101188->101209 101189 5c0055 101408 5e9e4a 89 API calls 4 library calls 101189->101408 101192 58b475 101196 588047 59 API calls 101192->101196 101194 5c0064 101195 588047 59 API calls 101195->101209 101196->101205 101197 58b47a 101197->101189 101208 5c09e5 101197->101208 101201 587667 59 API calls 101201->101209 101202 5a2d40 67 API calls __cinit 101202->101209 101203 5d6e8f 59 API calls 101203->101209 101204->101181 101206 5c09d6 101413 5e9e4a 89 API calls 4 library calls 101206->101413 101414 5e9e4a 89 API calls 4 library calls 101208->101414 101209->101188 101209->101189 101209->101192 101209->101195 101209->101197 101209->101201 101209->101202 101209->101203 101209->101205 101209->101206 101210 58a55a 101209->101210 101401 58c8c0 341 API calls 2 library calls 101209->101401 101402 58b900 60 API calls Mailbox 101209->101402 101412 5e9e4a 89 API calls 4 library calls 101210->101412 101406 58f6a3 341 API calls 101213->101406 101214->101181 101410 589c90 59 API calls Mailbox 101216->101410 101411 5e9e4a 89 API calls 4 library calls 101218->101411 101220->101183 101220->101205 101404 589d3c 60 API calls Mailbox 101221->101404 101223 58b22d 101405 589d3c 60 API calls Mailbox 101223->101405 101409 5e9e4a 89 API calls 4 library calls 101225->101409 101226->101181 101231 5ed09a 101230->101231 101232 5ed0a5 101230->101232 101446 589b3c 59 API calls 101231->101446 101235 587667 59 API calls 101232->101235 101266 5ed17f Mailbox 101232->101266 101234 5a0db6 Mailbox 59 API calls 101236 5ed1c8 101234->101236 101237 5ed0c9 101235->101237 101238 5ed1d4 101236->101238 101503 5857a6 60 API calls Mailbox 101236->101503 101239 587667 59 API calls 101237->101239 101415 589837 101238->101415 101242 5ed0d2 101239->101242 101244 589837 84 API calls 101242->101244 101246 5ed0de 101244->101246 101447 58459b 101246->101447 101249 5ed1ff GetLastError 101252 5ed218 101249->101252 101250 5ed233 101254 5ed25e 101250->101254 101255 5ed295 101250->101255 101251 5ed0f3 101253 587b2e 59 API calls 101251->101253 101274 5ed188 Mailbox 101252->101274 101504 5858ba CloseHandle 101252->101504 101256 5ed126 101253->101256 101257 5a0db6 Mailbox 59 API calls 101254->101257 101259 5a0db6 Mailbox 59 API calls 101255->101259 101258 5ed178 101256->101258 101498 5e3c37 101256->101498 101261 5ed263 101257->101261 101502 589b3c 59 API calls 101258->101502 101260 5ed29a 101259->101260 101268 587667 59 API calls 101260->101268 101260->101274 101265 5ed274 101261->101265 101269 587667 59 API calls 101261->101269 101505 5ffbce 59 API calls 2 library calls 101265->101505 101266->101234 101266->101274 101268->101274 101269->101265 101270 5ed13a 101271 587de1 59 API calls 101270->101271 101273 5ed147 101271->101273 101501 5e3a2a 63 API calls Mailbox 101273->101501 101274->101181 101276 5ed150 Mailbox 101276->101258 101576 5fcadd 101277->101576 101279 5fdf33 101279->101181 101687 589a98 101280->101687 101284 5a0db6 Mailbox 59 API calls 101285 591ff4 101284->101285 101287 592004 101285->101287 101715 5857a6 60 API calls Mailbox 101285->101715 101286 5c6585 101296 592029 101286->101296 101719 5ef574 59 API calls 101286->101719 101289 589837 84 API calls 101287->101289 101290 592012 101289->101290 101292 5857f6 67 API calls 101290->101292 101297 592021 101292->101297 101293 5c65cd 101294 5c65d5 101293->101294 101295 592036 101293->101295 101721 589b3c 59 API calls 101294->101721 101298 585cdf 2 API calls 101295->101298 101296->101295 101720 589b3c 59 API calls 101296->101720 101297->101286 101297->101296 101718 5858ba CloseHandle 101297->101718 101301 59203d 101298->101301 101302 5c65e7 101301->101302 101303 592057 101301->101303 101304 5a0db6 Mailbox 59 API calls 101302->101304 101305 587667 59 API calls 101303->101305 101306 5c65ed 101304->101306 101307 59205f 101305->101307 101308 5c6601 101306->101308 101722 585850 ReadFile SetFilePointerEx 101306->101722 101700 585572 101307->101700 101314 5c6605 _memmove 101308->101314 101723 5e76c4 59 API calls 2 library calls 101308->101723 101312 59206e 101312->101314 101716 589a3c 59 API calls Mailbox 101312->101716 101315 592082 Mailbox 101316 5920bc 101315->101316 101317 585c6f CloseHandle 101315->101317 101316->101181 101318 5920b0 101317->101318 101318->101316 101717 5858ba CloseHandle 101318->101717 101321 587667 59 API calls 101320->101321 101322 5fc2f4 101321->101322 101323 587667 59 API calls 101322->101323 101324 5fc2fc 101323->101324 101325 587667 59 API calls 101324->101325 101326 5fc304 101325->101326 101327 589837 84 API calls 101326->101327 101351 5fc312 101327->101351 101328 5fc528 Mailbox 101328->101181 101329 587bcc 59 API calls 101329->101351 101330 587924 59 API calls 101330->101351 101331 5fc4fb 101331->101328 101728 589a3c 59 API calls Mailbox 101331->101728 101332 5fc4e2 101335 587cab 59 API calls 101332->101335 101334 5fc4fd 101336 587cab 59 API calls 101334->101336 101338 5fc4ef 101335->101338 101339 5fc50c 101336->101339 101337 588047 59 API calls 101337->101351 101341 587b2e 59 API calls 101338->101341 101342 587b2e 59 API calls 101339->101342 101340 587e4f 59 API calls 101344 5fc3a9 CharUpperBuffW 101340->101344 101341->101331 101342->101331 101343 587e4f 59 API calls 101345 5fc469 CharUpperBuffW 101343->101345 101727 58843a 68 API calls 101344->101727 101347 58c5a7 69 API calls 101345->101347 101347->101351 101348 587cab 59 API calls 101348->101351 101349 589837 84 API calls 101349->101351 101350 587b2e 59 API calls 101350->101351 101351->101328 101351->101329 101351->101330 101351->101331 101351->101332 101351->101334 101351->101337 101351->101340 101351->101343 101351->101348 101351->101349 101351->101350 101353 5e7962 101352->101353 101354 5a0db6 Mailbox 59 API calls 101353->101354 101355 5e7970 101354->101355 101356 5e797e 101355->101356 101357 587667 59 API calls 101355->101357 101356->101181 101357->101356 101359 5fbc96 101358->101359 101360 5fbcb0 101358->101360 101729 5e9e4a 89 API calls 4 library calls 101359->101729 101730 5fa213 59 API calls Mailbox 101360->101730 101363 5fbcbb 101364 589ea0 340 API calls 101363->101364 101365 5fbd1c 101364->101365 101366 5fbdae 101365->101366 101369 5fbd5d 101365->101369 101391 5fbca8 Mailbox 101365->101391 101367 5fbe04 101366->101367 101368 5fbdb4 101366->101368 101370 589837 84 API calls 101367->101370 101367->101391 101752 5e791a 59 API calls 101368->101752 101731 5e72df 59 API calls Mailbox 101369->101731 101371 5fbe16 101370->101371 101375 587e4f 59 API calls 101371->101375 101373 5fbdd7 101753 585d41 59 API calls Mailbox 101373->101753 101378 5fbe3a CharUpperBuffW 101375->101378 101377 5fbd8d 101732 58f460 101377->101732 101381 5fbe54 101378->101381 101379 5fbddf Mailbox 101754 58fce0 341 API calls 2 library calls 101379->101754 101382 5fbe5b 101381->101382 101383 5fbea7 101381->101383 101755 5e72df 59 API calls Mailbox 101382->101755 101385 589837 84 API calls 101383->101385 101386 5fbeaf 101385->101386 101756 589e5d 60 API calls 101386->101756 101389 5fbe89 101390 58f460 340 API calls 101389->101390 101390->101391 101391->101181 101392 5fbeb9 101392->101391 101393 589837 84 API calls 101392->101393 101394 5fbed4 101393->101394 101757 585d41 59 API calls Mailbox 101394->101757 101396 5fbee4 101758 58fce0 341 API calls 2 library calls 101396->101758 102915 5d60c0 101398->102915 101400 5d618c 101400->101181 101401->101209 101402->101209 101403->101181 101404->101223 101405->101213 101406->101225 101407->101181 101408->101194 101409->101220 101410->101220 101411->101220 101412->101205 101413->101208 101414->101205 101417 589851 101415->101417 101425 58984b 101415->101425 101416 5bf5d3 __i64tow 101417->101416 101418 589899 101417->101418 101420 589857 __itow 101417->101420 101423 5bf4da 101417->101423 101506 5a3698 83 API calls 3 library calls 101418->101506 101422 5a0db6 Mailbox 59 API calls 101420->101422 101424 589871 101422->101424 101426 5a0db6 Mailbox 59 API calls 101423->101426 101431 5bf552 Mailbox _wcscpy 101423->101431 101424->101425 101427 587de1 59 API calls 101424->101427 101433 5857f6 101425->101433 101429 5bf51f 101426->101429 101427->101425 101428 5a0db6 Mailbox 59 API calls 101430 5bf545 101428->101430 101429->101428 101430->101431 101432 587de1 59 API calls 101430->101432 101507 5a3698 83 API calls 3 library calls 101431->101507 101432->101431 101508 585c6f 101433->101508 101437 585844 101437->101249 101437->101250 101438 585821 101438->101437 101520 585610 101438->101520 101440 585833 101537 58527b SetFilePointerEx SetFilePointerEx 101440->101537 101442 5bdc07 101538 5e345a SetFilePointerEx SetFilePointerEx WriteFile 101442->101538 101443 58583a 101443->101437 101443->101442 101445 5bdc37 101445->101437 101446->101232 101448 587667 59 API calls 101447->101448 101449 5845b1 101448->101449 101450 587667 59 API calls 101449->101450 101451 5845b9 101450->101451 101452 587667 59 API calls 101451->101452 101453 5845c1 101452->101453 101454 587667 59 API calls 101453->101454 101455 5845c9 101454->101455 101456 5845fd 101455->101456 101457 5bd4d2 101455->101457 101458 58784b 59 API calls 101456->101458 101459 588047 59 API calls 101457->101459 101460 58460b 101458->101460 101461 5bd4db 101459->101461 101462 587d2c 59 API calls 101460->101462 101463 587d8c 59 API calls 101461->101463 101464 584615 101462->101464 101466 584640 101463->101466 101465 58784b 59 API calls 101464->101465 101464->101466 101468 584636 101465->101468 101469 58465f 101466->101469 101481 584680 101466->101481 101483 5bd4fb 101466->101483 101471 587d2c 59 API calls 101468->101471 101567 5879f2 101469->101567 101470 584691 101474 5846a3 101470->101474 101477 588047 59 API calls 101470->101477 101471->101466 101472 5bd5cb 101475 587bcc 59 API calls 101472->101475 101478 5846b3 101474->101478 101480 588047 59 API calls 101474->101480 101493 5bd588 101475->101493 101477->101474 101482 588047 59 API calls 101478->101482 101484 5846ba 101478->101484 101479 58784b 59 API calls 101479->101481 101480->101478 101554 58784b 101481->101554 101482->101484 101483->101472 101485 5bd5b4 101483->101485 101491 5bd532 101483->101491 101486 588047 59 API calls 101484->101486 101495 5846c1 Mailbox 101484->101495 101485->101472 101487 5bd59f 101485->101487 101486->101495 101489 587bcc 59 API calls 101487->101489 101488 5bd590 101490 587bcc 59 API calls 101488->101490 101489->101493 101490->101493 101491->101488 101496 5bd57b 101491->101496 101492 5879f2 59 API calls 101492->101493 101493->101481 101493->101492 101570 587924 59 API calls 2 library calls 101493->101570 101495->101251 101497 587bcc 59 API calls 101496->101497 101497->101493 101572 5e445a GetFileAttributesW 101498->101572 101501->101276 101502->101266 101503->101238 101504->101274 101505->101274 101506->101420 101507->101416 101509 585c88 101508->101509 101510 585802 101508->101510 101509->101510 101511 585c8d CloseHandle 101509->101511 101512 585c99 101510->101512 101511->101510 101513 5bdd58 101512->101513 101514 585cb2 CreateFileW 101512->101514 101515 5bdd5e CreateFileW 101513->101515 101516 585cd4 101513->101516 101514->101516 101515->101516 101517 5bdd84 101515->101517 101516->101438 101539 585aee 101517->101539 101521 58562b 101520->101521 101522 5bdba5 101520->101522 101523 585aee 2 API calls 101521->101523 101536 5856ba 101521->101536 101522->101536 101549 585cdf 101522->101549 101524 58564d 101523->101524 101525 58522e 59 API calls 101524->101525 101527 585657 101525->101527 101527->101522 101528 585664 101527->101528 101529 5a0db6 Mailbox 59 API calls 101528->101529 101530 58566f 101529->101530 101531 58522e 59 API calls 101530->101531 101532 58567a 101531->101532 101533 585bc0 2 API calls 101532->101533 101534 5856a7 101533->101534 101535 585aee 2 API calls 101534->101535 101535->101536 101536->101440 101537->101443 101538->101445 101546 585b08 101539->101546 101540 5bdd28 101548 585c4e SetFilePointerEx 101540->101548 101541 585b8f SetFilePointerEx 101547 585c4e SetFilePointerEx 101541->101547 101544 5bdd42 101545 585b63 101545->101516 101546->101540 101546->101541 101546->101545 101547->101545 101548->101544 101550 585aee 2 API calls 101549->101550 101551 585d00 101550->101551 101552 585aee 2 API calls 101551->101552 101553 585d14 101552->101553 101553->101536 101555 58785a 101554->101555 101556 5878b7 101554->101556 101555->101556 101557 587865 101555->101557 101558 587d2c 59 API calls 101556->101558 101559 5beb09 101557->101559 101560 587880 101557->101560 101563 587888 _memmove 101558->101563 101562 588029 59 API calls 101559->101562 101571 587f27 59 API calls Mailbox 101560->101571 101564 5beb13 101562->101564 101563->101470 101565 5a0db6 Mailbox 59 API calls 101564->101565 101566 5beb33 101565->101566 101568 587e4f 59 API calls 101567->101568 101569 584669 101568->101569 101569->101479 101569->101481 101570->101493 101571->101563 101573 5e3c3e 101572->101573 101574 5e4475 FindFirstFileW 101572->101574 101573->101258 101573->101270 101574->101573 101575 5e448a FindClose 101574->101575 101575->101573 101577 589837 84 API calls 101576->101577 101578 5fcb1a 101577->101578 101581 5fcb61 Mailbox 101578->101581 101614 5fd7a5 101578->101614 101580 5fcbb2 Mailbox 101580->101581 101587 589837 84 API calls 101580->101587 101601 5fcdb9 101580->101601 101646 5ffbce 59 API calls 2 library calls 101580->101646 101647 5fcfdf 61 API calls 2 library calls 101580->101647 101581->101279 101582 5fcf2e 101664 5fd8c8 92 API calls Mailbox 101582->101664 101585 5fcf3d 101586 5fcdc7 101585->101586 101588 5fcf49 101585->101588 101627 5fc96e 101586->101627 101587->101580 101588->101581 101593 5fce00 101642 5a0c08 101593->101642 101596 5fce1a 101648 5e9e4a 89 API calls 4 library calls 101596->101648 101597 5fce33 101649 5892ce 101597->101649 101600 5fce25 GetCurrentProcess TerminateProcess 101600->101597 101601->101582 101601->101586 101606 5fcfa4 101606->101581 101610 5fcfb8 FreeLibrary 101606->101610 101607 5fce6b 101661 5fd649 107 API calls _free 101607->101661 101610->101581 101613 5fce7c 101613->101606 101662 588d40 59 API calls Mailbox 101613->101662 101663 589d3c 60 API calls Mailbox 101613->101663 101665 5fd649 107 API calls _free 101613->101665 101615 587e4f 59 API calls 101614->101615 101616 5fd7c0 CharLowerBuffW 101615->101616 101666 5df167 101616->101666 101620 587667 59 API calls 101621 5fd7f9 101620->101621 101622 58784b 59 API calls 101621->101622 101623 5fd810 101622->101623 101624 587d2c 59 API calls 101623->101624 101625 5fd81c Mailbox 101624->101625 101626 5fd858 Mailbox 101625->101626 101673 5fcfdf 61 API calls 2 library calls 101625->101673 101626->101580 101628 5fc989 101627->101628 101632 5fc9de 101627->101632 101629 5a0db6 Mailbox 59 API calls 101628->101629 101630 5fc9ab 101629->101630 101631 5a0db6 Mailbox 59 API calls 101630->101631 101630->101632 101631->101630 101633 5fda50 101632->101633 101634 5fdc79 Mailbox 101633->101634 101636 5fda73 _strcat _wcscpy __NMSG_WRITE 101633->101636 101634->101593 101635 589b98 59 API calls 101635->101636 101636->101634 101636->101635 101637 589b3c 59 API calls 101636->101637 101638 589be6 59 API calls 101636->101638 101639 589837 84 API calls 101636->101639 101640 5a571c 58 API calls __crtLCMapStringA_stat 101636->101640 101676 5e5887 61 API calls 2 library calls 101636->101676 101637->101636 101638->101636 101639->101636 101640->101636 101643 5a0c1d 101642->101643 101644 5a0cb5 VirtualProtect 101643->101644 101645 5a0c83 101643->101645 101644->101645 101645->101596 101645->101597 101646->101580 101647->101580 101648->101600 101650 5892d6 101649->101650 101651 5a0db6 Mailbox 59 API calls 101650->101651 101652 5892e4 101651->101652 101654 5892f0 101652->101654 101677 5891fc 59 API calls Mailbox 101652->101677 101655 589050 101654->101655 101678 589160 101655->101678 101657 58905f 101658 5a0db6 Mailbox 59 API calls 101657->101658 101659 5890fb 101657->101659 101658->101659 101659->101613 101660 588d40 59 API calls Mailbox 101659->101660 101660->101607 101661->101613 101662->101613 101663->101613 101664->101585 101665->101613 101668 5df192 __NMSG_WRITE 101666->101668 101667 5df1d1 101667->101620 101667->101625 101668->101667 101669 5df1c7 101668->101669 101670 5df278 101668->101670 101669->101667 101674 5878c4 61 API calls 101669->101674 101670->101667 101675 5878c4 61 API calls 101670->101675 101673->101626 101674->101669 101675->101670 101676->101636 101677->101654 101679 589169 Mailbox 101678->101679 101680 5bf19f 101679->101680 101684 589173 101679->101684 101681 5a0db6 Mailbox 59 API calls 101680->101681 101683 5bf1ab 101681->101683 101682 58917a 101682->101657 101684->101682 101686 589c90 59 API calls Mailbox 101684->101686 101686->101684 101688 589aa8 101687->101688 101689 5bf7d6 101687->101689 101694 5a0db6 Mailbox 59 API calls 101688->101694 101690 5bf7e7 101689->101690 101691 587bcc 59 API calls 101689->101691 101692 587d8c 59 API calls 101690->101692 101691->101690 101693 5bf7f1 101692->101693 101697 589ad4 101693->101697 101698 587667 59 API calls 101693->101698 101695 589abb 101694->101695 101695->101693 101696 589ac6 101695->101696 101696->101697 101699 587de1 59 API calls 101696->101699 101697->101284 101697->101286 101698->101697 101699->101697 101701 58557d 101700->101701 101702 5855a2 101700->101702 101701->101702 101706 58558c 101701->101706 101703 587d8c 59 API calls 101702->101703 101707 5e325e 101703->101707 101704 5e328d 101704->101312 101708 585ab8 59 API calls 101706->101708 101707->101704 101724 5e31fa ReadFile SetFilePointerEx 101707->101724 101725 587924 59 API calls 2 library calls 101707->101725 101709 5e337e 101708->101709 101711 5854d2 61 API calls 101709->101711 101712 5e338c 101711->101712 101714 5e339c Mailbox 101712->101714 101726 5877da 61 API calls Mailbox 101712->101726 101714->101312 101715->101287 101716->101315 101717->101316 101718->101286 101719->101286 101720->101293 101721->101301 101722->101308 101723->101314 101724->101707 101725->101707 101726->101714 101727->101351 101728->101328 101729->101391 101730->101363 101731->101377 101733 58f4ba 101732->101733 101734 58f650 101732->101734 101736 5c441e 101733->101736 101737 58f4c6 101733->101737 101735 587de1 59 API calls 101734->101735 101743 58f58c Mailbox 101735->101743 101738 5fbc6b 341 API calls 101736->101738 101759 58f290 101737->101759 101740 5c442c 101738->101740 101744 58f630 101740->101744 101873 5e9e4a 89 API calls 4 library calls 101740->101873 101742 58f4fd 101742->101740 101742->101743 101742->101744 101746 58f5e3 101743->101746 101751 5e3c37 3 API calls 101743->101751 101774 584e4a 101743->101774 101780 5ecb7a 101743->101780 101860 5f445a 101743->101860 101869 5fdf37 101743->101869 101744->101391 101746->101744 101872 589c90 59 API calls Mailbox 101746->101872 101751->101746 101752->101373 101753->101379 101754->101391 101755->101389 101756->101392 101757->101396 101758->101391 101760 58f43a 101759->101760 101762 58f2bc 101759->101762 101875 5e9e4a 89 API calls 4 library calls 101760->101875 101762->101760 101771 58f2f9 _memmove 101762->101771 101763 58f3d3 101764 58f3e3 101763->101764 101874 5fa2d9 85 API calls Mailbox 101763->101874 101764->101742 101766 5a0db6 59 API calls Mailbox 101766->101771 101767 5c43f9 101877 58f6a3 341 API calls 101767->101877 101768 589ea0 341 API calls 101768->101771 101770 5c43a9 101770->101742 101771->101763 101771->101766 101771->101767 101771->101768 101771->101770 101772 5c43ab 101771->101772 101876 5e9e4a 89 API calls 4 library calls 101772->101876 101775 584e54 101774->101775 101776 584e5b 101774->101776 101878 5a53a6 101775->101878 101778 584e6a 101776->101778 101779 584e7b FreeLibrary 101776->101779 101778->101746 101779->101778 101781 587667 59 API calls 101780->101781 101782 5ecbaf 101781->101782 101783 587667 59 API calls 101782->101783 101784 5ecbb8 101783->101784 101785 5ecbcc 101784->101785 102285 589b3c 59 API calls 101784->102285 101787 589837 84 API calls 101785->101787 101788 5ecbe9 101787->101788 101789 5eccea 101788->101789 101790 5ecc0b 101788->101790 101859 5ecd1a Mailbox 101788->101859 102152 584ddd 101789->102152 101791 589837 84 API calls 101790->101791 101793 5ecc17 101791->101793 101795 588047 59 API calls 101793->101795 101798 5ecc23 101795->101798 101796 5ecd16 101797 587667 59 API calls 101796->101797 101796->101859 101800 5ecd4b 101797->101800 101803 5ecc69 101798->101803 101804 5ecc37 101798->101804 101799 584ddd 136 API calls 101799->101796 101801 587667 59 API calls 101800->101801 101802 5ecd54 101801->101802 101806 587667 59 API calls 101802->101806 101805 589837 84 API calls 101803->101805 101807 588047 59 API calls 101804->101807 101809 5ecc76 101805->101809 101810 5ecd5d 101806->101810 101808 5ecc47 101807->101808 101811 587cab 59 API calls 101808->101811 101812 588047 59 API calls 101809->101812 101813 587667 59 API calls 101810->101813 101814 5ecc51 101811->101814 101815 5ecc82 101812->101815 101816 5ecd66 101813->101816 101817 589837 84 API calls 101814->101817 102286 5e4a31 GetFileAttributesW 101815->102286 101819 589837 84 API calls 101816->101819 101820 5ecc5d 101817->101820 101822 5ecd73 101819->101822 101823 587b2e 59 API calls 101820->101823 101821 5ecc8b 101824 5ecc9e 101821->101824 101828 5879f2 59 API calls 101821->101828 101825 58459b 59 API calls 101822->101825 101823->101803 101827 589837 84 API calls 101824->101827 101834 5ecca4 101824->101834 101826 5ecd8e 101825->101826 101829 5879f2 59 API calls 101826->101829 101830 5ecccb 101827->101830 101828->101824 101831 5ecd9d 101829->101831 102287 5e37ef 75 API calls Mailbox 101830->102287 101833 5ecdd1 101831->101833 101835 5879f2 59 API calls 101831->101835 101836 588047 59 API calls 101833->101836 101834->101859 101837 5ecdae 101835->101837 101838 5ecddf 101836->101838 101837->101833 101840 587bcc 59 API calls 101837->101840 101839 587b2e 59 API calls 101838->101839 101841 5ecded 101839->101841 101842 5ecdc3 101840->101842 101843 587b2e 59 API calls 101841->101843 101845 587bcc 59 API calls 101842->101845 101844 5ecdfb 101843->101844 101846 587b2e 59 API calls 101844->101846 101845->101833 101847 5ece09 101846->101847 101848 589837 84 API calls 101847->101848 101849 5ece15 101848->101849 102176 5e4071 101849->102176 101851 5ece26 101852 5e3c37 3 API calls 101851->101852 101853 5ece30 101852->101853 101854 589837 84 API calls 101853->101854 101857 5ece61 101853->101857 101855 5ece4e 101854->101855 102230 5e9155 101855->102230 101858 584e4a 84 API calls 101857->101858 101858->101859 101859->101746 101861 589837 84 API calls 101860->101861 101862 5f4494 101861->101862 102876 586240 101862->102876 101864 5f44a4 101865 5f44c9 101864->101865 101866 589ea0 341 API calls 101864->101866 101867 589a98 59 API calls 101865->101867 101868 5f44cd 101865->101868 101866->101865 101867->101868 101868->101746 101870 5fcadd 130 API calls 101869->101870 101871 5fdf47 101870->101871 101871->101746 101872->101746 101873->101744 101874->101764 101875->101770 101876->101770 101877->101770 101879 5a53b2 _fseek 101878->101879 101880 5a53de 101879->101880 101881 5a53c6 101879->101881 101888 5a53d6 _fseek 101880->101888 101891 5a6c11 101880->101891 101913 5a8b28 58 API calls __getptd_noexit 101881->101913 101883 5a53cb 101914 5a8db6 9 API calls __wtof_l 101883->101914 101888->101776 101892 5a6c43 EnterCriticalSection 101891->101892 101893 5a6c21 101891->101893 101895 5a53f0 101892->101895 101893->101892 101894 5a6c29 101893->101894 101896 5a9c0b __lock 58 API calls 101894->101896 101897 5a533a 101895->101897 101896->101895 101898 5a5349 101897->101898 101899 5a535d 101897->101899 101959 5a8b28 58 API calls __getptd_noexit 101898->101959 101905 5a5359 101899->101905 101916 5a4a3d 101899->101916 101902 5a534e 101960 5a8db6 9 API calls __wtof_l 101902->101960 101915 5a5415 LeaveCriticalSection LeaveCriticalSection _fseek 101905->101915 101909 5a5377 101933 5b0a02 101909->101933 101911 5a537d 101911->101905 101912 5a2d55 _free 58 API calls 101911->101912 101912->101905 101913->101883 101914->101888 101915->101888 101917 5a4a74 101916->101917 101918 5a4a50 101916->101918 101922 5b0b77 101917->101922 101918->101917 101919 5a46e6 __ftell_nolock 58 API calls 101918->101919 101920 5a4a6d 101919->101920 101961 5ad886 101920->101961 101923 5a5371 101922->101923 101924 5b0b84 101922->101924 101926 5a46e6 101923->101926 101924->101923 101925 5a2d55 _free 58 API calls 101924->101925 101925->101923 101927 5a46f0 101926->101927 101928 5a4705 101926->101928 102107 5a8b28 58 API calls __getptd_noexit 101927->102107 101928->101909 101930 5a46f5 102108 5a8db6 9 API calls __wtof_l 101930->102108 101932 5a4700 101932->101909 101934 5b0a0e _fseek 101933->101934 101935 5b0a1b 101934->101935 101936 5b0a32 101934->101936 102124 5a8af4 58 API calls __getptd_noexit 101935->102124 101938 5b0abd 101936->101938 101940 5b0a42 101936->101940 102129 5a8af4 58 API calls __getptd_noexit 101938->102129 101939 5b0a20 102125 5a8b28 58 API calls __getptd_noexit 101939->102125 101943 5b0a6a 101940->101943 101944 5b0a60 101940->101944 101946 5ad206 ___lock_fhandle 59 API calls 101943->101946 102126 5a8af4 58 API calls __getptd_noexit 101944->102126 101945 5b0a65 102130 5a8b28 58 API calls __getptd_noexit 101945->102130 101948 5b0a70 101946->101948 101951 5b0a8e 101948->101951 101952 5b0a83 101948->101952 101950 5b0ac9 102131 5a8db6 9 API calls __wtof_l 101950->102131 102127 5a8b28 58 API calls __getptd_noexit 101951->102127 102109 5b0add 101952->102109 101955 5b0a27 _fseek 101955->101911 101957 5b0a89 102128 5b0ab5 LeaveCriticalSection __unlock_fhandle 101957->102128 101959->101902 101960->101905 101962 5ad892 _fseek 101961->101962 101963 5ad89f 101962->101963 101964 5ad8b6 101962->101964 102062 5a8af4 58 API calls __getptd_noexit 101963->102062 101966 5ad955 101964->101966 101969 5ad8ca 101964->101969 102068 5a8af4 58 API calls __getptd_noexit 101966->102068 101968 5ad8a4 102063 5a8b28 58 API calls __getptd_noexit 101968->102063 101970 5ad8e8 101969->101970 101971 5ad8f2 101969->101971 102064 5a8af4 58 API calls __getptd_noexit 101970->102064 101989 5ad206 101971->101989 101972 5ad8ed 102069 5a8b28 58 API calls __getptd_noexit 101972->102069 101976 5ad8f8 101978 5ad90b 101976->101978 101979 5ad91e 101976->101979 101998 5ad975 101978->101998 102065 5a8b28 58 API calls __getptd_noexit 101979->102065 101980 5ad961 102070 5a8db6 9 API calls __wtof_l 101980->102070 101984 5ad8ab _fseek 101984->101917 101985 5ad917 102067 5ad94d LeaveCriticalSection __unlock_fhandle 101985->102067 101986 5ad923 102066 5a8af4 58 API calls __getptd_noexit 101986->102066 101990 5ad212 _fseek 101989->101990 101991 5ad261 EnterCriticalSection 101990->101991 101992 5a9c0b __lock 58 API calls 101990->101992 101993 5ad287 _fseek 101991->101993 101994 5ad237 101992->101994 101993->101976 101995 5ad24f 101994->101995 102071 5a9e2b InitializeCriticalSectionAndSpinCount 101994->102071 102072 5ad28b LeaveCriticalSection _doexit 101995->102072 101999 5ad982 __ftell_nolock 101998->101999 102000 5ad9e0 101999->102000 102001 5ad9c1 101999->102001 102030 5ad9b6 101999->102030 102004 5ada38 102000->102004 102005 5ada1c 102000->102005 102082 5a8af4 58 API calls __getptd_noexit 102001->102082 102009 5ada51 102004->102009 102088 5b18c1 60 API calls 3 library calls 102004->102088 102085 5a8af4 58 API calls __getptd_noexit 102005->102085 102006 5ae1d6 102006->101985 102007 5ad9c6 102083 5a8b28 58 API calls __getptd_noexit 102007->102083 102073 5b5c6b 102009->102073 102011 5ada21 102086 5a8b28 58 API calls __getptd_noexit 102011->102086 102013 5ad9cd 102084 5a8db6 9 API calls __wtof_l 102013->102084 102017 5addb8 102020 5ae14b WriteFile 102017->102020 102021 5addd6 102017->102021 102018 5ada5f 102018->102017 102089 5a99ac 58 API calls 2 library calls 102018->102089 102019 5ada28 102087 5a8db6 9 API calls __wtof_l 102019->102087 102024 5addab GetLastError 102020->102024 102029 5add78 102020->102029 102025 5adefa 102021->102025 102033 5addec 102021->102033 102024->102029 102036 5adfef 102025->102036 102038 5adf05 102025->102038 102026 5ada8b GetConsoleMode 102026->102017 102028 5adaca 102026->102028 102027 5ae184 102027->102030 102094 5a8b28 58 API calls __getptd_noexit 102027->102094 102028->102017 102031 5adada GetConsoleCP 102028->102031 102029->102027 102029->102030 102035 5aded8 102029->102035 102096 5ac5f6 102030->102096 102031->102027 102059 5adb09 102031->102059 102032 5ade5b WriteFile 102032->102024 102037 5ade98 102032->102037 102033->102027 102033->102032 102041 5ae17b 102035->102041 102042 5adee3 102035->102042 102036->102027 102043 5ae064 WideCharToMultiByte 102036->102043 102037->102033 102044 5adebc 102037->102044 102038->102027 102045 5adf6a WriteFile 102038->102045 102039 5ae1b2 102095 5a8af4 58 API calls __getptd_noexit 102039->102095 102093 5a8b07 58 API calls 3 library calls 102041->102093 102091 5a8b28 58 API calls __getptd_noexit 102042->102091 102043->102024 102054 5ae0ab 102043->102054 102044->102029 102045->102024 102046 5adfb9 102045->102046 102046->102029 102046->102038 102046->102044 102049 5adee8 102092 5a8af4 58 API calls __getptd_noexit 102049->102092 102050 5ae0b3 WriteFile 102053 5ae106 GetLastError 102050->102053 102050->102054 102053->102054 102054->102029 102054->102036 102054->102044 102054->102050 102055 5b7a5e WriteConsoleW CreateFileW __putwch_nolock 102060 5adc5f 102055->102060 102056 5b62ba 60 API calls __write_nolock 102056->102059 102057 5adbf2 WideCharToMultiByte 102057->102029 102058 5adc2d WriteFile 102057->102058 102058->102024 102058->102060 102059->102029 102059->102056 102059->102057 102059->102060 102090 5a35f5 58 API calls __isleadbyte_l 102059->102090 102060->102024 102060->102029 102060->102055 102060->102059 102061 5adc87 WriteFile 102060->102061 102061->102024 102061->102060 102062->101968 102063->101984 102064->101972 102065->101986 102066->101985 102067->101984 102068->101972 102069->101980 102070->101984 102071->101995 102072->101991 102074 5b5c76 102073->102074 102076 5b5c83 102073->102076 102103 5a8b28 58 API calls __getptd_noexit 102074->102103 102079 5b5c8f 102076->102079 102104 5a8b28 58 API calls __getptd_noexit 102076->102104 102078 5b5c7b 102078->102018 102079->102018 102080 5b5cb0 102105 5a8db6 9 API calls __wtof_l 102080->102105 102082->102007 102083->102013 102084->102030 102085->102011 102086->102019 102087->102030 102088->102009 102089->102026 102090->102059 102091->102049 102092->102030 102093->102030 102094->102039 102095->102030 102097 5ac5fe 102096->102097 102098 5ac600 IsProcessorFeaturePresent 102096->102098 102097->102006 102100 5b590a 102098->102100 102106 5b58b9 5 API calls ___raise_securityfailure 102100->102106 102102 5b59ed 102102->102006 102103->102078 102104->102080 102105->102078 102106->102102 102107->101930 102108->101932 102132 5ad4c3 102109->102132 102111 5b0b41 102145 5ad43d 59 API calls 2 library calls 102111->102145 102113 5b0aeb 102113->102111 102114 5b0b1f 102113->102114 102116 5ad4c3 __lseeki64_nolock 58 API calls 102113->102116 102114->102111 102117 5ad4c3 __lseeki64_nolock 58 API calls 102114->102117 102115 5b0b49 102118 5b0b6b 102115->102118 102146 5a8b07 58 API calls 3 library calls 102115->102146 102119 5b0b16 102116->102119 102120 5b0b2b CloseHandle 102117->102120 102118->101957 102122 5ad4c3 __lseeki64_nolock 58 API calls 102119->102122 102120->102111 102123 5b0b37 GetLastError 102120->102123 102122->102114 102123->102111 102124->101939 102125->101955 102126->101945 102127->101957 102128->101955 102129->101945 102130->101950 102131->101955 102133 5ad4ce 102132->102133 102134 5ad4e3 102132->102134 102147 5a8af4 58 API calls __getptd_noexit 102133->102147 102140 5ad508 102134->102140 102149 5a8af4 58 API calls __getptd_noexit 102134->102149 102136 5ad4d3 102148 5a8b28 58 API calls __getptd_noexit 102136->102148 102138 5ad512 102150 5a8b28 58 API calls __getptd_noexit 102138->102150 102140->102113 102142 5ad4db 102142->102113 102143 5ad51a 102151 5a8db6 9 API calls __wtof_l 102143->102151 102145->102115 102146->102118 102147->102136 102148->102142 102149->102138 102150->102143 102151->102142 102288 584bb5 102152->102288 102157 584e08 LoadLibraryExW 102298 584b6a 102157->102298 102158 5bd8e6 102159 584e4a 84 API calls 102158->102159 102161 5bd8ed 102159->102161 102163 584b6a 3 API calls 102161->102163 102165 5bd8f5 102163->102165 102324 584f0b 102165->102324 102166 584e2f 102166->102165 102167 584e3b 102166->102167 102169 584e4a 84 API calls 102167->102169 102171 584e40 102169->102171 102171->101796 102171->101799 102173 5bd91c 102332 584ec7 102173->102332 102177 5e408d 102176->102177 102178 5e4092 102177->102178 102179 5e40a0 102177->102179 102180 588047 59 API calls 102178->102180 102181 587667 59 API calls 102179->102181 102229 5e409b Mailbox 102180->102229 102182 5e40a8 102181->102182 102183 587667 59 API calls 102182->102183 102184 5e40b0 102183->102184 102185 587667 59 API calls 102184->102185 102186 5e40bb 102185->102186 102187 587667 59 API calls 102186->102187 102188 5e40c3 102187->102188 102189 587667 59 API calls 102188->102189 102190 5e40cb 102189->102190 102191 587667 59 API calls 102190->102191 102229->101851 102231 5e9162 __ftell_nolock 102230->102231 102232 5a0db6 Mailbox 59 API calls 102231->102232 102233 5e91bf 102232->102233 102285->101785 102286->101821 102287->101834 102337 584c03 102288->102337 102291 584bdc 102292 584bec FreeLibrary 102291->102292 102293 584bf5 102291->102293 102292->102293 102295 5a525b 102293->102295 102294 584c03 2 API calls 102294->102291 102341 5a5270 102295->102341 102297 584dfc 102297->102157 102297->102158 102498 584c36 102298->102498 102301 584b8f 102303 584baa 102301->102303 102304 584ba1 FreeLibrary 102301->102304 102302 584c36 2 API calls 102302->102301 102305 584c70 102303->102305 102304->102303 102306 5a0db6 Mailbox 59 API calls 102305->102306 102307 584c85 102306->102307 102308 58522e 59 API calls 102307->102308 102309 584c91 _memmove 102308->102309 102310 584ccc 102309->102310 102311 584d89 102309->102311 102312 584dc1 102309->102312 102313 584ec7 69 API calls 102310->102313 102502 584e89 CreateStreamOnHGlobal 102311->102502 102513 5e991b 95 API calls 102312->102513 102317 584cd5 102313->102317 102316 584f0b 74 API calls 102316->102317 102317->102316 102318 584d69 102317->102318 102320 5bd8a7 102317->102320 102508 584ee5 102317->102508 102318->102166 102321 584ee5 85 API calls 102320->102321 102322 5bd8bb 102321->102322 102323 584f0b 74 API calls 102322->102323 102323->102318 102325 584f1d 102324->102325 102326 5bd9cd 102324->102326 102531 5a55e2 102325->102531 102329 5e9109 102712 5e8f5f 102329->102712 102331 5e911f 102331->102173 102333 5bd990 102332->102333 102334 584ed6 102332->102334 102717 5a5c60 102334->102717 102336 584ede 102338 584bd0 102337->102338 102339 584c0c LoadLibraryA 102337->102339 102338->102291 102338->102294 102339->102338 102340 584c1d GetProcAddress 102339->102340 102340->102338 102343 5a527c _fseek 102341->102343 102342 5a528f 102390 5a8b28 58 API calls __getptd_noexit 102342->102390 102343->102342 102345 5a52c0 102343->102345 102360 5b04e8 102345->102360 102346 5a5294 102391 5a8db6 9 API calls __wtof_l 102346->102391 102349 5a52c5 102350 5a52db 102349->102350 102351 5a52ce 102349->102351 102353 5a5305 102350->102353 102354 5a52e5 102350->102354 102392 5a8b28 58 API calls __getptd_noexit 102351->102392 102375 5b0607 102353->102375 102393 5a8b28 58 API calls __getptd_noexit 102354->102393 102359 5a529f _fseek @_EH4_CallFilterFunc@8 102359->102297 102361 5b04f4 _fseek 102360->102361 102362 5a9c0b __lock 58 API calls 102361->102362 102372 5b0502 102362->102372 102363 5b0576 102395 5b05fe 102363->102395 102364 5b057d 102366 5a881d __malloc_crt 58 API calls 102364->102366 102368 5b0584 102366->102368 102367 5b05f3 _fseek 102367->102349 102368->102363 102400 5a9e2b InitializeCriticalSectionAndSpinCount 102368->102400 102371 5a9c93 __mtinitlocknum 58 API calls 102371->102372 102372->102363 102372->102364 102372->102371 102398 5a6c50 59 API calls __lock 102372->102398 102399 5a6cba LeaveCriticalSection LeaveCriticalSection _doexit 102372->102399 102373 5b05aa EnterCriticalSection 102373->102363 102384 5b0627 __wopenfile 102375->102384 102376 5b0641 102405 5a8b28 58 API calls __getptd_noexit 102376->102405 102377 5b07fc 102377->102376 102381 5b085f 102377->102381 102379 5b0646 102406 5a8db6 9 API calls __wtof_l 102379->102406 102402 5b85a1 102381->102402 102382 5a5310 102394 5a5332 LeaveCriticalSection LeaveCriticalSection _fseek 102382->102394 102384->102376 102384->102377 102407 5a37cb 60 API calls 2 library calls 102384->102407 102386 5b07f5 102386->102377 102408 5a37cb 60 API calls 2 library calls 102386->102408 102388 5b0814 102388->102377 102409 5a37cb 60 API calls 2 library calls 102388->102409 102390->102346 102391->102359 102392->102359 102393->102359 102394->102359 102401 5a9d75 LeaveCriticalSection 102395->102401 102397 5b0605 102397->102367 102398->102372 102399->102372 102400->102373 102401->102397 102410 5b7d85 102402->102410 102404 5b85ba 102404->102382 102405->102379 102406->102382 102407->102386 102408->102388 102409->102377 102411 5b7d91 _fseek 102410->102411 102412 5b7da7 102411->102412 102415 5b7ddd 102411->102415 102495 5a8b28 58 API calls __getptd_noexit 102412->102495 102414 5b7dac 102496 5a8db6 9 API calls __wtof_l 102414->102496 102421 5b7e4e 102415->102421 102418 5b7df9 102497 5b7e22 LeaveCriticalSection __unlock_fhandle 102418->102497 102420 5b7db6 _fseek 102420->102404 102422 5b7e6e 102421->102422 102423 5a44ea __wsopen_nolock 58 API calls 102422->102423 102426 5b7e8a 102423->102426 102424 5a8dc6 __invoke_watson 8 API calls 102425 5b85a0 102424->102425 102428 5b7d85 __wsopen_helper 103 API calls 102425->102428 102427 5b7ec4 102426->102427 102438 5b7ee7 102426->102438 102469 5b7fc1 102426->102469 102429 5a8af4 __write_nolock 58 API calls 102427->102429 102430 5b85ba 102428->102430 102431 5b7ec9 102429->102431 102430->102418 102432 5a8b28 __wtof_l 58 API calls 102431->102432 102433 5b7ed6 102432->102433 102435 5a8db6 __wtof_l 9 API calls 102433->102435 102434 5b7fa5 102436 5a8af4 __write_nolock 58 API calls 102434->102436 102461 5b7ee0 102435->102461 102437 5b7faa 102436->102437 102439 5a8b28 __wtof_l 58 API calls 102437->102439 102438->102434 102442 5b7f83 102438->102442 102440 5b7fb7 102439->102440 102441 5a8db6 __wtof_l 9 API calls 102440->102441 102441->102469 102443 5ad294 __alloc_osfhnd 61 API calls 102442->102443 102444 5b8051 102443->102444 102445 5b805b 102444->102445 102446 5b807e 102444->102446 102447 5a8af4 __write_nolock 58 API calls 102445->102447 102448 5b7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 102446->102448 102449 5b8060 102447->102449 102459 5b80a0 102448->102459 102450 5a8b28 __wtof_l 58 API calls 102449->102450 102452 5b806a 102450->102452 102451 5b811e GetFileType 102453 5b816b 102451->102453 102454 5b8129 GetLastError 102451->102454 102457 5a8b28 __wtof_l 58 API calls 102452->102457 102464 5ad52a __set_osfhnd 59 API calls 102453->102464 102458 5a8b07 __dosmaperr 58 API calls 102454->102458 102455 5b80ec GetLastError 102456 5a8b07 __dosmaperr 58 API calls 102455->102456 102460 5b8111 102456->102460 102457->102461 102462 5b8150 CloseHandle 102458->102462 102459->102451 102459->102455 102463 5b7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 102459->102463 102467 5a8b28 __wtof_l 58 API calls 102460->102467 102461->102418 102462->102460 102465 5b815e 102462->102465 102466 5b80e1 102463->102466 102472 5b8189 102464->102472 102468 5a8b28 __wtof_l 58 API calls 102465->102468 102466->102451 102466->102455 102467->102469 102470 5b8163 102468->102470 102469->102424 102470->102460 102471 5b8344 102471->102469 102474 5b8517 CloseHandle 102471->102474 102472->102471 102473 5b18c1 __lseeki64_nolock 60 API calls 102472->102473 102491 5b820a 102472->102491 102475 5b81f3 102473->102475 102476 5b7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 102474->102476 102478 5a8af4 __write_nolock 58 API calls 102475->102478 102475->102491 102477 5b853e 102476->102477 102479 5b8572 102477->102479 102480 5b8546 GetLastError 102477->102480 102478->102491 102479->102469 102481 5a8b07 __dosmaperr 58 API calls 102480->102481 102483 5b8552 102481->102483 102482 5b823c 102486 5b97a2 __chsize_nolock 82 API calls 102482->102486 102482->102491 102487 5ad43d __free_osfhnd 59 API calls 102483->102487 102484 5b0e5b 70 API calls __read_nolock 102484->102491 102485 5b0add __close_nolock 61 API calls 102485->102491 102486->102482 102487->102479 102488 5ad886 __write 78 API calls 102488->102491 102489 5b83c1 102490 5b0add __close_nolock 61 API calls 102489->102490 102492 5b83c8 102490->102492 102491->102471 102491->102482 102491->102484 102491->102485 102491->102488 102491->102489 102493 5b18c1 60 API calls __lseeki64_nolock 102491->102493 102494 5a8b28 __wtof_l 58 API calls 102492->102494 102493->102491 102494->102469 102495->102414 102496->102420 102497->102420 102499 584b83 102498->102499 102500 584c3f LoadLibraryA 102498->102500 102499->102301 102499->102302 102500->102499 102501 584c50 GetProcAddress 102500->102501 102501->102499 102503 584ea3 FindResourceExW 102502->102503 102507 584ec0 102502->102507 102504 5bd933 LoadResource 102503->102504 102503->102507 102505 5bd948 SizeofResource 102504->102505 102504->102507 102506 5bd95c LockResource 102505->102506 102505->102507 102506->102507 102507->102310 102509 5bd9ab 102508->102509 102510 584ef4 102508->102510 102514 5a584d 102510->102514 102512 584f02 102512->102317 102513->102310 102518 5a5859 _fseek 102514->102518 102515 5a586b 102527 5a8b28 58 API calls __getptd_noexit 102515->102527 102517 5a5891 102520 5a6c11 __lock_file 59 API calls 102517->102520 102518->102515 102518->102517 102519 5a5870 102528 5a8db6 9 API calls __wtof_l 102519->102528 102522 5a5897 102520->102522 102529 5a57be 83 API calls 4 library calls 102522->102529 102524 5a58a6 102530 5a58c8 LeaveCriticalSection LeaveCriticalSection _fseek 102524->102530 102526 5a587b _fseek 102526->102512 102527->102519 102528->102526 102529->102524 102530->102526 102534 5a55fd 102531->102534 102533 584f2e 102533->102329 102535 5a5609 _fseek 102534->102535 102536 5a5644 _fseek 102535->102536 102537 5a561f _memset 102535->102537 102538 5a564c 102535->102538 102536->102533 102561 5a8b28 58 API calls __getptd_noexit 102537->102561 102539 5a6c11 __lock_file 59 API calls 102538->102539 102541 5a5652 102539->102541 102547 5a541d 102541->102547 102542 5a5639 102562 5a8db6 9 API calls __wtof_l 102542->102562 102550 5a5438 _memset 102547->102550 102554 5a5453 102547->102554 102548 5a5443 102652 5a8b28 58 API calls __getptd_noexit 102548->102652 102550->102548 102552 5a5493 102550->102552 102550->102554 102552->102554 102555 5a55a4 _memset 102552->102555 102557 5a46e6 __ftell_nolock 58 API calls 102552->102557 102564 5b0e5b 102552->102564 102632 5b0ba7 102552->102632 102654 5b0cc8 58 API calls 3 library calls 102552->102654 102563 5a5686 LeaveCriticalSection LeaveCriticalSection _fseek 102554->102563 102655 5a8b28 58 API calls __getptd_noexit 102555->102655 102557->102552 102559 5a5448 102653 5a8db6 9 API calls __wtof_l 102559->102653 102561->102542 102562->102536 102563->102536 102565 5b0e7c 102564->102565 102566 5b0e93 102564->102566 102656 5a8af4 58 API calls __getptd_noexit 102565->102656 102568 5b15cb 102566->102568 102572 5b0ecd 102566->102572 102671 5a8af4 58 API calls __getptd_noexit 102568->102671 102569 5b0e81 102657 5a8b28 58 API calls __getptd_noexit 102569->102657 102575 5b0ed5 102572->102575 102580 5b0eec 102572->102580 102573 5b15d0 102672 5a8b28 58 API calls __getptd_noexit 102573->102672 102658 5a8af4 58 API calls __getptd_noexit 102575->102658 102576 5b0ee1 102673 5a8db6 9 API calls __wtof_l 102576->102673 102578 5b0eda 102659 5a8b28 58 API calls __getptd_noexit 102578->102659 102581 5b0f01 102580->102581 102583 5b0f1b 102580->102583 102585 5b0f39 102580->102585 102612 5b0e88 102580->102612 102660 5a8af4 58 API calls __getptd_noexit 102581->102660 102583->102581 102589 5b0f26 102583->102589 102586 5a881d __malloc_crt 58 API calls 102585->102586 102587 5b0f49 102586->102587 102590 5b0f6c 102587->102590 102591 5b0f51 102587->102591 102588 5b5c6b __write_nolock 58 API calls 102592 5b103a 102588->102592 102589->102588 102663 5b18c1 60 API calls 3 library calls 102590->102663 102661 5a8b28 58 API calls __getptd_noexit 102591->102661 102594 5b10b3 ReadFile 102592->102594 102599 5b1050 GetConsoleMode 102592->102599 102597 5b1593 GetLastError 102594->102597 102598 5b10d5 102594->102598 102596 5b0f56 102662 5a8af4 58 API calls __getptd_noexit 102596->102662 102601 5b15a0 102597->102601 102602 5b1093 102597->102602 102598->102597 102606 5b10a5 102598->102606 102603 5b10b0 102599->102603 102604 5b1064 102599->102604 102669 5a8b28 58 API calls __getptd_noexit 102601->102669 102619 5b1099 102602->102619 102664 5a8b07 58 API calls 3 library calls 102602->102664 102603->102594 102604->102603 102607 5b106a ReadConsoleW 102604->102607 102614 5b1377 102606->102614 102617 5b110a 102606->102617 102606->102619 102607->102606 102609 5b108d GetLastError 102607->102609 102608 5b15a5 102670 5a8af4 58 API calls __getptd_noexit 102608->102670 102609->102602 102612->102552 102613 5a2d55 _free 58 API calls 102613->102612 102614->102619 102620 5b147d ReadFile 102614->102620 102615 5b11f7 102615->102619 102622 5b12a4 102615->102622 102625 5b12b4 102615->102625 102627 5b1264 MultiByteToWideChar 102615->102627 102617->102615 102618 5b1176 ReadFile 102617->102618 102621 5b1197 GetLastError 102618->102621 102630 5b11a1 102618->102630 102619->102612 102619->102613 102624 5b14a0 GetLastError 102620->102624 102629 5b14ae 102620->102629 102621->102630 102666 5a8b28 58 API calls __getptd_noexit 102622->102666 102624->102629 102625->102627 102667 5b18c1 60 API calls 3 library calls 102625->102667 102627->102609 102627->102619 102629->102614 102668 5b18c1 60 API calls 3 library calls 102629->102668 102630->102617 102665 5b18c1 60 API calls 3 library calls 102630->102665 102633 5b0bb2 102632->102633 102638 5b0bc7 102632->102638 102707 5a8b28 58 API calls __getptd_noexit 102633->102707 102635 5b0bb7 102708 5a8db6 9 API calls __wtof_l 102635->102708 102637 5b0bfc 102640 5a46e6 __ftell_nolock 58 API calls 102637->102640 102638->102637 102646 5b0bc2 102638->102646 102709 5b5fe4 102638->102709 102641 5b0c10 102640->102641 102674 5b0d47 102641->102674 102643 5b0c17 102644 5a46e6 __ftell_nolock 58 API calls 102643->102644 102643->102646 102645 5b0c3a 102644->102645 102645->102646 102647 5a46e6 __ftell_nolock 58 API calls 102645->102647 102646->102552 102648 5b0c46 102647->102648 102648->102646 102649 5a46e6 __ftell_nolock 58 API calls 102648->102649 102650 5b0c53 102649->102650 102651 5a46e6 __ftell_nolock 58 API calls 102650->102651 102651->102646 102652->102559 102653->102554 102654->102552 102655->102559 102656->102569 102657->102612 102658->102578 102659->102576 102660->102578 102661->102596 102662->102612 102663->102589 102664->102619 102665->102630 102666->102619 102667->102627 102668->102629 102669->102608 102670->102619 102671->102573 102672->102576 102673->102612 102675 5b0d53 _fseek 102674->102675 102676 5b0d60 102675->102676 102677 5b0d77 102675->102677 102679 5a8af4 __write_nolock 58 API calls 102676->102679 102678 5b0e3b 102677->102678 102680 5b0d8b 102677->102680 102681 5a8af4 __write_nolock 58 API calls 102678->102681 102682 5b0d65 102679->102682 102683 5b0da9 102680->102683 102684 5b0db6 102680->102684 102685 5b0dae 102681->102685 102686 5a8b28 __wtof_l 58 API calls 102682->102686 102687 5a8af4 __write_nolock 58 API calls 102683->102687 102688 5b0dd8 102684->102688 102689 5b0dc3 102684->102689 102693 5a8b28 __wtof_l 58 API calls 102685->102693 102690 5b0d6c _fseek 102686->102690 102687->102685 102692 5ad206 ___lock_fhandle 59 API calls 102688->102692 102691 5a8af4 __write_nolock 58 API calls 102689->102691 102690->102643 102694 5b0dc8 102691->102694 102695 5b0dde 102692->102695 102696 5b0dd0 102693->102696 102697 5a8b28 __wtof_l 58 API calls 102694->102697 102698 5b0df1 102695->102698 102699 5b0e04 102695->102699 102700 5a8db6 __wtof_l 9 API calls 102696->102700 102697->102696 102702 5b0e5b __read_nolock 70 API calls 102698->102702 102701 5a8b28 __wtof_l 58 API calls 102699->102701 102700->102690 102704 5b0e09 102701->102704 102703 5b0dfd 102702->102703 102706 5b0e33 __read LeaveCriticalSection 102703->102706 102705 5a8af4 __write_nolock 58 API calls 102704->102705 102705->102703 102706->102690 102707->102635 102708->102646 102710 5a881d __malloc_crt 58 API calls 102709->102710 102711 5b5ff9 102710->102711 102711->102637 102715 5a520a GetSystemTimeAsFileTime 102712->102715 102714 5e8f6e 102714->102331 102716 5a5238 __aulldiv 102715->102716 102716->102714 102718 5a5c6c _fseek 102717->102718 102719 5a5c7e 102718->102719 102720 5a5c93 102718->102720 102731 5a8b28 58 API calls __getptd_noexit 102719->102731 102722 5a6c11 __lock_file 59 API calls 102720->102722 102724 5a5c99 102722->102724 102723 5a5c83 102732 5a8db6 9 API calls __wtof_l 102723->102732 102733 5a58d0 67 API calls 5 library calls 102724->102733 102727 5a5ca4 102734 5a5cc4 LeaveCriticalSection LeaveCriticalSection _fseek 102727->102734 102729 5a5cb6 102730 5a5c8e _fseek 102729->102730 102730->102336 102731->102723 102732->102730 102733->102727 102734->102729 102877 587a16 59 API calls 102876->102877 102896 586265 102877->102896 102878 58646a 102903 58750f 102878->102903 102880 586484 Mailbox 102880->101864 102883 5bdff6 102913 5df8aa 91 API calls 4 library calls 102883->102913 102884 58750f 59 API calls 102884->102896 102888 5be004 102890 58750f 59 API calls 102888->102890 102889 587d8c 59 API calls 102889->102896 102891 5be01a 102890->102891 102891->102880 102892 586799 _memmove 102914 5df8aa 91 API calls 4 library calls 102892->102914 102893 5bdf92 102894 588029 59 API calls 102893->102894 102895 5bdf9d 102894->102895 102900 5a0db6 Mailbox 59 API calls 102895->102900 102896->102878 102896->102883 102896->102884 102896->102889 102896->102892 102896->102893 102898 587e4f 59 API calls 102896->102898 102901 585f6c 60 API calls 102896->102901 102902 585d41 59 API calls Mailbox 102896->102902 102911 585e72 60 API calls 102896->102911 102912 587924 59 API calls 2 library calls 102896->102912 102899 58643b CharUpperBuffW 102898->102899 102899->102896 102900->102892 102901->102896 102902->102896 102904 5875af 102903->102904 102907 587522 _memmove 102903->102907 102906 5a0db6 Mailbox 59 API calls 102904->102906 102905 5a0db6 Mailbox 59 API calls 102908 587529 102905->102908 102906->102907 102907->102905 102909 5a0db6 Mailbox 59 API calls 102908->102909 102910 587552 102908->102910 102909->102910 102910->102880 102911->102896 102912->102896 102913->102888 102914->102880 102916 5d60e8 102915->102916 102917 5d60cb 102915->102917 102916->101400 102917->102916 102919 5d60ab 59 API calls Mailbox 102917->102919 102919->102917 102920 f98580 102934 f961d0 102920->102934 102922 f98675 102937 f98470 102922->102937 102940 f996a0 GetPEB 102934->102940 102936 f9685b 102936->102922 102938 f98479 Sleep 102937->102938 102939 f98487 102938->102939 102941 f996ca 102940->102941 102941->102936 102942 583633 102943 58366a 102942->102943 102944 5836e5 102943->102944 102945 583688 102943->102945 102946 5836e7 102943->102946 102947 5836ca DefWindowProcW 102944->102947 102950 58374b PostQuitMessage 102945->102950 102951 583695 102945->102951 102948 5836ed 102946->102948 102949 5bd0cc 102946->102949 102957 5836d8 102947->102957 102952 5836f2 102948->102952 102953 583715 SetTimer RegisterWindowMessageW 102948->102953 102991 591070 10 API calls Mailbox 102949->102991 102950->102957 102955 5836a0 102951->102955 102956 5bd154 102951->102956 102958 5836f9 KillTimer 102952->102958 102959 5bd06f 102952->102959 102953->102957 102961 58373e CreatePopupMenu 102953->102961 102962 5836a8 102955->102962 102963 583755 102955->102963 103007 5e2527 71 API calls _memset 102956->103007 102987 58443a Shell_NotifyIconW _memset 102958->102987 102965 5bd0a8 MoveWindow 102959->102965 102966 5bd074 102959->102966 102960 5bd0f3 102992 591093 341 API calls Mailbox 102960->102992 102961->102957 102969 5bd139 102962->102969 102970 5836b3 102962->102970 102989 5844a0 64 API calls _memset 102963->102989 102965->102957 102973 5bd078 102966->102973 102974 5bd097 SetFocus 102966->102974 102969->102947 103006 5d7c36 59 API calls Mailbox 102969->103006 102976 5836be 102970->102976 102977 5bd124 102970->102977 102971 5bd166 102971->102947 102971->102957 102973->102976 102979 5bd081 102973->102979 102974->102957 102975 58370c 102988 583114 DeleteObject DestroyWindow Mailbox 102975->102988 102976->102947 102993 58443a Shell_NotifyIconW _memset 102976->102993 103005 5e2d36 81 API calls _memset 102977->103005 102978 583764 102978->102957 102990 591070 10 API calls Mailbox 102979->102990 102985 5bd118 102994 58434a 102985->102994 102987->102975 102988->102957 102989->102978 102990->102957 102991->102960 102992->102976 102993->102985 102995 584375 _memset 102994->102995 103008 584182 102995->103008 102998 5843fa 103000 584430 Shell_NotifyIconW 102998->103000 103001 584414 Shell_NotifyIconW 102998->103001 103002 584422 103000->103002 103001->103002 103012 58407c 103002->103012 103004 584429 103004->102944 103005->102978 103006->102944 103007->102971 103009 5bd423 103008->103009 103010 584196 103008->103010 103009->103010 103011 5bd42c DestroyIcon 103009->103011 103010->102998 103034 5e2f94 62 API calls _W_store_winword 103010->103034 103011->103010 103013 584098 103012->103013 103033 58416f Mailbox 103012->103033 103014 587a16 59 API calls 103013->103014 103015 5840a6 103014->103015 103016 5bd3c8 LoadStringW 103015->103016 103017 5840b3 103015->103017 103020 5bd3e2 103016->103020 103018 587bcc 59 API calls 103017->103018 103019 5840c8 103018->103019 103019->103020 103021 5840d9 103019->103021 103022 587b2e 59 API calls 103020->103022 103023 5840e3 103021->103023 103024 584174 103021->103024 103027 5bd3ec 103022->103027 103025 587b2e 59 API calls 103023->103025 103026 588047 59 API calls 103024->103026 103029 5840ed _memset _wcscpy 103025->103029 103026->103029 103028 587cab 59 API calls 103027->103028 103027->103029 103030 5bd40e 103028->103030 103031 584155 Shell_NotifyIconW 103029->103031 103032 587cab 59 API calls 103030->103032 103031->103033 103032->103029 103033->103004 103034->102998 103035 5a7c56 103036 5a7c62 _fseek 103035->103036 103072 5a9e08 GetStartupInfoW 103036->103072 103039 5a7c67 103074 5a8b7c GetProcessHeap 103039->103074 103040 5a7cbf 103041 5a7cca 103040->103041 103157 5a7da6 58 API calls 3 library calls 103040->103157 103075 5a9ae6 103041->103075 103044 5a7cd0 103045 5a7cdb __RTC_Initialize 103044->103045 103158 5a7da6 58 API calls 3 library calls 103044->103158 103096 5ad5d2 103045->103096 103048 5a7cea 103049 5a7cf6 GetCommandLineW 103048->103049 103159 5a7da6 58 API calls 3 library calls 103048->103159 103115 5b4f23 GetEnvironmentStringsW 103049->103115 103052 5a7cf5 103052->103049 103055 5a7d10 103056 5a7d1b 103055->103056 103160 5a30b5 58 API calls 3 library calls 103055->103160 103125 5b4d58 103056->103125 103059 5a7d21 103060 5a7d2c 103059->103060 103161 5a30b5 58 API calls 3 library calls 103059->103161 103139 5a30ef 103060->103139 103063 5a7d34 103064 5a7d3f __wwincmdln 103063->103064 103162 5a30b5 58 API calls 3 library calls 103063->103162 103145 5847d0 103064->103145 103067 5a7d53 103068 5a7d62 103067->103068 103163 5a3358 58 API calls _doexit 103067->103163 103164 5a30e0 58 API calls _doexit 103068->103164 103071 5a7d67 _fseek 103073 5a9e1e 103072->103073 103073->103039 103074->103040 103165 5a3187 36 API calls 2 library calls 103075->103165 103077 5a9aeb 103166 5a9d3c InitializeCriticalSectionAndSpinCount __getstream 103077->103166 103079 5a9af0 103080 5a9af4 103079->103080 103168 5a9d8a TlsAlloc 103079->103168 103167 5a9b5c 61 API calls 2 library calls 103080->103167 103083 5a9af9 103083->103044 103084 5a9b06 103084->103080 103085 5a9b11 103084->103085 103169 5a87d5 103085->103169 103088 5a9b53 103177 5a9b5c 61 API calls 2 library calls 103088->103177 103091 5a9b32 103091->103088 103093 5a9b38 103091->103093 103092 5a9b58 103092->103044 103176 5a9a33 58 API calls 4 library calls 103093->103176 103095 5a9b40 GetCurrentThreadId 103095->103044 103097 5ad5de _fseek 103096->103097 103098 5a9c0b __lock 58 API calls 103097->103098 103099 5ad5e5 103098->103099 103100 5a87d5 __calloc_crt 58 API calls 103099->103100 103101 5ad5f6 103100->103101 103102 5ad661 GetStartupInfoW 103101->103102 103103 5ad601 _fseek @_EH4_CallFilterFunc@8 103101->103103 103109 5ad676 103102->103109 103112 5ad7a5 103102->103112 103103->103048 103104 5ad86d 103191 5ad87d LeaveCriticalSection _doexit 103104->103191 103106 5a87d5 __calloc_crt 58 API calls 103106->103109 103107 5ad7f2 GetStdHandle 103107->103112 103108 5ad805 GetFileType 103108->103112 103109->103106 103111 5ad6c4 103109->103111 103109->103112 103110 5ad6f8 GetFileType 103110->103111 103111->103110 103111->103112 103189 5a9e2b InitializeCriticalSectionAndSpinCount 103111->103189 103112->103104 103112->103107 103112->103108 103190 5a9e2b InitializeCriticalSectionAndSpinCount 103112->103190 103116 5a7d06 103115->103116 103117 5b4f34 103115->103117 103121 5b4b1b GetModuleFileNameW 103116->103121 103118 5a881d __malloc_crt 58 API calls 103117->103118 103119 5b4f5a _memmove 103118->103119 103120 5b4f70 FreeEnvironmentStringsW 103119->103120 103120->103116 103122 5b4b4f _wparse_cmdline 103121->103122 103123 5a881d __malloc_crt 58 API calls 103122->103123 103124 5b4b8f _wparse_cmdline 103122->103124 103123->103124 103124->103055 103126 5b4d69 103125->103126 103127 5b4d71 __NMSG_WRITE 103125->103127 103126->103059 103128 5a87d5 __calloc_crt 58 API calls 103127->103128 103133 5b4d9a __NMSG_WRITE 103128->103133 103129 5b4df1 103130 5a2d55 _free 58 API calls 103129->103130 103130->103126 103131 5a87d5 __calloc_crt 58 API calls 103131->103133 103132 5b4e16 103134 5a2d55 _free 58 API calls 103132->103134 103133->103126 103133->103129 103133->103131 103133->103132 103136 5b4e2d 103133->103136 103192 5b4607 58 API calls __wtof_l 103133->103192 103134->103126 103193 5a8dc6 IsProcessorFeaturePresent 103136->103193 103138 5b4e39 103138->103059 103141 5a30fb __IsNonwritableInCurrentImage 103139->103141 103208 5aa4d1 103141->103208 103142 5a3119 __initterm_e 103143 5a2d40 __cinit 67 API calls 103142->103143 103144 5a3138 __cinit __IsNonwritableInCurrentImage 103142->103144 103143->103144 103144->103063 103146 584889 103145->103146 103147 5847ea 103145->103147 103146->103067 103148 584824 IsThemeActive 103147->103148 103211 5a336c 103148->103211 103152 584850 103223 5848fd SystemParametersInfoW SystemParametersInfoW 103152->103223 103154 58485c 103224 583b3a 103154->103224 103157->103041 103158->103045 103159->103052 103163->103068 103164->103071 103165->103077 103166->103079 103167->103083 103168->103084 103170 5a87dc 103169->103170 103172 5a8817 103170->103172 103174 5a87fa 103170->103174 103178 5b51f6 103170->103178 103172->103088 103175 5a9de6 TlsSetValue 103172->103175 103174->103170 103174->103172 103186 5aa132 Sleep 103174->103186 103175->103091 103176->103095 103177->103092 103179 5b5201 103178->103179 103182 5b521c 103178->103182 103180 5b520d 103179->103180 103179->103182 103187 5a8b28 58 API calls __getptd_noexit 103180->103187 103181 5b522c RtlAllocateHeap 103181->103182 103184 5b5212 103181->103184 103182->103181 103182->103184 103188 5a33a1 DecodePointer 103182->103188 103184->103170 103186->103174 103187->103184 103188->103182 103189->103111 103190->103112 103191->103103 103192->103133 103194 5a8dd1 103193->103194 103199 5a8c59 103194->103199 103198 5a8dec 103198->103138 103200 5a8c73 _memset ___raise_securityfailure 103199->103200 103201 5a8c93 IsDebuggerPresent 103200->103201 103207 5aa155 SetUnhandledExceptionFilter UnhandledExceptionFilter 103201->103207 103203 5ac5f6 __crtLCMapStringA_stat 6 API calls 103205 5a8d7a 103203->103205 103204 5a8d57 ___raise_securityfailure 103204->103203 103206 5aa140 GetCurrentProcess TerminateProcess 103205->103206 103206->103198 103207->103204 103209 5aa4d4 EncodePointer 103208->103209 103209->103209 103210 5aa4ee 103209->103210 103210->103142 103212 5a9c0b __lock 58 API calls 103211->103212 103213 5a3377 DecodePointer EncodePointer 103212->103213 103276 5a9d75 LeaveCriticalSection 103213->103276 103215 584849 103216 5a33d4 103215->103216 103217 5a33f8 103216->103217 103218 5a33de 103216->103218 103217->103152 103218->103217 103277 5a8b28 58 API calls __getptd_noexit 103218->103277 103220 5a33e8 103278 5a8db6 9 API calls __wtof_l 103220->103278 103222 5a33f3 103222->103152 103223->103154 103225 583b47 __ftell_nolock 103224->103225 103226 587667 59 API calls 103225->103226 103227 583b51 GetCurrentDirectoryW 103226->103227 103279 583766 103227->103279 103276->103215 103277->103220 103278->103222 103280 587667 59 API calls 103279->103280 103281 58377c 103280->103281 103480 583d31 103281->103480 103283 58379a 103284 584706 61 API calls 103283->103284 103285 5837ae 103284->103285 103286 587de1 59 API calls 103285->103286 103287 5837bb 103286->103287 103288 584ddd 136 API calls 103287->103288 103289 5837d4 103288->103289 103290 5837dc Mailbox 103289->103290 103291 5bd173 103289->103291 103294 588047 59 API calls 103290->103294 103522 5e955b 103291->103522 103297 5837ef 103294->103297 103295 5bd192 103296 5a2d55 _free 58 API calls 103295->103296 103299 5bd19f 103296->103299 103494 58928a 103297->103494 103298 584e4a 84 API calls 103298->103295 103301 584e4a 84 API calls 103299->103301 103303 5bd1a8 103301->103303 103307 583ed0 59 API calls 103303->103307 103304 587de1 59 API calls 103305 583808 103304->103305 103306 5884c0 69 API calls 103305->103306 103308 58381a Mailbox 103306->103308 103309 5bd1c3 103307->103309 103310 587de1 59 API calls 103308->103310 103311 583ed0 59 API calls 103309->103311 103312 583840 103310->103312 103313 5bd1df 103311->103313 103314 5884c0 69 API calls 103312->103314 103315 584706 61 API calls 103313->103315 103317 58384f Mailbox 103314->103317 103316 5bd204 103315->103316 103318 583ed0 59 API calls 103316->103318 103320 587667 59 API calls 103317->103320 103319 5bd210 103318->103319 103321 588047 59 API calls 103319->103321 103322 58386d 103320->103322 103497 583ed0 103322->103497 103481 583d3e __ftell_nolock 103480->103481 103482 587bcc 59 API calls 103481->103482 103488 583ea4 Mailbox 103481->103488 103484 583d70 103482->103484 103483 5879f2 59 API calls 103483->103484 103484->103483 103493 583da6 Mailbox 103484->103493 103485 5879f2 59 API calls 103485->103493 103486 583e77 103487 587de1 59 API calls 103486->103487 103486->103488 103490 583e98 103487->103490 103488->103283 103489 587de1 59 API calls 103489->103493 103491 583f74 59 API calls 103490->103491 103491->103488 103492 583f74 59 API calls 103492->103493 103493->103485 103493->103486 103493->103488 103493->103489 103493->103492 103495 5a0db6 Mailbox 59 API calls 103494->103495 103496 5837fb 103495->103496 103496->103304 103498 583eda 103497->103498 103499 583ef3 103497->103499 103501 588047 59 API calls 103498->103501 103500 587bcc 59 API calls 103499->103500 103502 583879 103500->103502 103501->103502 103523 584ee5 85 API calls 103522->103523 103524 5e95ca 103523->103524 103525 5e9734 96 API calls 103524->103525 103526 5e95dc 103525->103526 103527 584f0b 74 API calls 103526->103527 103555 5bd186 103526->103555 103528 5e95f7 103527->103528 103529 584f0b 74 API calls 103528->103529 103530 5e9607 103529->103530 103531 584f0b 74 API calls 103530->103531 103532 5e9622 103531->103532 103533 584f0b 74 API calls 103532->103533 103534 5e963d 103533->103534 103535 584ee5 85 API calls 103534->103535 103536 5e9654 103535->103536 103537 5a571c __crtLCMapStringA_stat 58 API calls 103536->103537 103538 5e965b 103537->103538 103539 5a571c __crtLCMapStringA_stat 58 API calls 103538->103539 103540 5e9665 103539->103540 103541 584f0b 74 API calls 103540->103541 103555->103295 103555->103298 103799 581055 103804 582649 103799->103804 103802 5a2d40 __cinit 67 API calls 103803 581064 103802->103803 103805 587667 59 API calls 103804->103805 103806 5826b7 103805->103806 103811 583582 103806->103811 103809 582754 103810 58105a 103809->103810 103814 583416 59 API calls 2 library calls 103809->103814 103810->103802 103815 5835b0 103811->103815 103814->103809 103816 5835bd 103815->103816 103817 5835a1 103815->103817 103816->103817 103818 5835c4 RegOpenKeyExW 103816->103818 103817->103809 103818->103817 103819 5835de RegQueryValueExW 103818->103819 103820 5835ff 103819->103820 103821 583614 RegCloseKey 103819->103821 103820->103821 103821->103817 103822 581066 103827 58f76f 103822->103827 103824 58106c 103825 5a2d40 __cinit 67 API calls 103824->103825 103826 581076 103825->103826 103828 58f790 103827->103828 103860 59ff03 103828->103860 103832 58f7d7 103833 587667 59 API calls 103832->103833 103834 58f7e1 103833->103834 103835 587667 59 API calls 103834->103835 103836 58f7eb 103835->103836 103837 587667 59 API calls 103836->103837 103838 58f7f5 103837->103838 103839 587667 59 API calls 103838->103839 103840 58f833 103839->103840 103841 587667 59 API calls 103840->103841 103842 58f8fe 103841->103842 103870 595f87 103842->103870 103846 58f930 103847 587667 59 API calls 103846->103847 103848 58f93a 103847->103848 103898 59fd9e 103848->103898 103850 58f981 103851 58f991 GetStdHandle 103850->103851 103852 58f9dd 103851->103852 103853 5c45ab 103851->103853 103854 58f9e5 OleInitialize 103852->103854 103853->103852 103855 5c45b4 103853->103855 103854->103824 103905 5e6b38 64 API calls Mailbox 103855->103905 103857 5c45bb 103906 5e7207 CreateThread 103857->103906 103859 5c45c7 CloseHandle 103859->103854 103907 59ffdc 103860->103907 103863 59ffdc 59 API calls 103864 59ff45 103863->103864 103865 587667 59 API calls 103864->103865 103866 59ff51 103865->103866 103867 587bcc 59 API calls 103866->103867 103868 58f796 103867->103868 103869 5a0162 6 API calls 103868->103869 103869->103832 103871 587667 59 API calls 103870->103871 103872 595f97 103871->103872 103873 587667 59 API calls 103872->103873 103874 595f9f 103873->103874 103914 595a9d 103874->103914 103877 595a9d 59 API calls 103878 595faf 103877->103878 103879 587667 59 API calls 103878->103879 103880 595fba 103879->103880 103881 5a0db6 Mailbox 59 API calls 103880->103881 103882 58f908 103881->103882 103883 5960f9 103882->103883 103884 596107 103883->103884 103885 587667 59 API calls 103884->103885 103886 596112 103885->103886 103887 587667 59 API calls 103886->103887 103888 59611d 103887->103888 103889 587667 59 API calls 103888->103889 103890 596128 103889->103890 103891 587667 59 API calls 103890->103891 103892 596133 103891->103892 103893 595a9d 59 API calls 103892->103893 103894 59613e 103893->103894 103895 5a0db6 Mailbox 59 API calls 103894->103895 103896 596145 RegisterWindowMessageW 103895->103896 103896->103846 103899 5d576f 103898->103899 103900 59fdae 103898->103900 103917 5e9ae7 60 API calls 103899->103917 103902 5a0db6 Mailbox 59 API calls 103900->103902 103904 59fdb6 103902->103904 103903 5d577a 103904->103850 103905->103857 103906->103859 103918 5e71ed 65 API calls 103906->103918 103908 587667 59 API calls 103907->103908 103909 59ffe7 103908->103909 103910 587667 59 API calls 103909->103910 103911 59ffef 103910->103911 103912 587667 59 API calls 103911->103912 103913 59ff3b 103912->103913 103913->103863 103915 587667 59 API calls 103914->103915 103916 595aa5 103915->103916 103916->103877 103917->103903 103919 581016 103924 584974 103919->103924 103922 5a2d40 __cinit 67 API calls 103923 581025 103922->103923 103925 5a0db6 Mailbox 59 API calls 103924->103925 103926 58497c 103925->103926 103927 58101b 103926->103927 103931 584936 103926->103931 103927->103922 103932 58493f 103931->103932 103933 584951 103931->103933 103934 5a2d40 __cinit 67 API calls 103932->103934 103935 5849a0 103933->103935 103934->103933 103936 587667 59 API calls 103935->103936 103937 5849b8 GetVersionExW 103936->103937 103938 587bcc 59 API calls 103937->103938 103939 5849fb 103938->103939 103940 587d2c 59 API calls 103939->103940 103949 584a28 103939->103949 103941 584a1c 103940->103941 103942 587726 59 API calls 103941->103942 103942->103949 103943 584a93 GetCurrentProcess IsWow64Process 103944 584aac 103943->103944 103946 584b2b GetSystemInfo 103944->103946 103947 584ac2 103944->103947 103945 5bd864 103948 584af8 103946->103948 103959 584b37 103947->103959 103948->103927 103949->103943 103949->103945 103952 584b1f GetSystemInfo 103954 584ae9 103952->103954 103953 584ad4 103955 584b37 2 API calls 103953->103955 103954->103948 103957 584aef FreeLibrary 103954->103957 103956 584adc GetNativeSystemInfo 103955->103956 103956->103954 103957->103948 103960 584ad0 103959->103960 103961 584b40 LoadLibraryA 103959->103961 103960->103952 103960->103953 103961->103960 103962 584b51 GetProcAddress 103961->103962 103962->103960

                                                  Control-flow Graph

                                                  APIs
                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00583B68
                                                  • IsDebuggerPresent.KERNEL32 ref: 00583B7A
                                                  • GetFullPathNameW.KERNEL32(00007FFF,?,?,006452F8,006452E0,?,?), ref: 00583BEB
                                                    • Part of subcall function 00587BCC: _memmove.LIBCMT ref: 00587C06
                                                    • Part of subcall function 0059092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00583C14,006452F8,?,?,?), ref: 0059096E
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00583C6F
                                                  • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00637770,00000010), ref: 005BD281
                                                  • SetCurrentDirectoryW.KERNEL32(?,006452F8,?,?,?), ref: 005BD2B9
                                                  • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00634260,006452F8,?,?,?), ref: 005BD33F
                                                  • ShellExecuteW.SHELL32(00000000,?,?), ref: 005BD346
                                                    • Part of subcall function 00583A46: GetSysColorBrush.USER32(0000000F), ref: 00583A50
                                                    • Part of subcall function 00583A46: LoadCursorW.USER32(00000000,00007F00), ref: 00583A5F
                                                    • Part of subcall function 00583A46: LoadIconW.USER32(00000063), ref: 00583A76
                                                    • Part of subcall function 00583A46: LoadIconW.USER32(000000A4), ref: 00583A88
                                                    • Part of subcall function 00583A46: LoadIconW.USER32(000000A2), ref: 00583A9A
                                                    • Part of subcall function 00583A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00583AC0
                                                    • Part of subcall function 00583A46: RegisterClassExW.USER32(?), ref: 00583B16
                                                    • Part of subcall function 005839D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00583A03
                                                    • Part of subcall function 005839D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00583A24
                                                    • Part of subcall function 005839D5: ShowWindow.USER32(00000000,?,?), ref: 00583A38
                                                    • Part of subcall function 005839D5: ShowWindow.USER32(00000000,?,?), ref: 00583A41
                                                    • Part of subcall function 0058434A: _memset.LIBCMT ref: 00584370
                                                    • Part of subcall function 0058434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00584415
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                  • String ID: This is a third-party compiled AutoIt script.$runas$%a
                                                  • API String ID: 529118366-2465501499
                                                  • Opcode ID: 87390ddc4bc66210cbf21a0cea3c4a38c0afe44f83849a4d3d8c8f1b1334e4d8
                                                  • Instruction ID: 190143997e560429f24560ffb9776c718d71e7bd71cf41e0c1e4ae9095cae8eb
                                                  • Opcode Fuzzy Hash: 87390ddc4bc66210cbf21a0cea3c4a38c0afe44f83849a4d3d8c8f1b1334e4d8
                                                  • Instruction Fuzzy Hash: 9851B475A0454AAFCB11FBB4DC099FE7F76BF89710F104066F812B21A2DAA09B05CB21

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1037 5849a0-584a00 call 587667 GetVersionExW call 587bcc 1042 584b0b-584b0d 1037->1042 1043 584a06 1037->1043 1044 5bd767-5bd773 1042->1044 1045 584a09-584a0e 1043->1045 1046 5bd774-5bd778 1044->1046 1047 584b12-584b13 1045->1047 1048 584a14 1045->1048 1050 5bd77b-5bd787 1046->1050 1051 5bd77a 1046->1051 1049 584a15-584a4c call 587d2c call 587726 1047->1049 1048->1049 1059 584a52-584a53 1049->1059 1060 5bd864-5bd867 1049->1060 1050->1046 1053 5bd789-5bd78e 1050->1053 1051->1050 1053->1045 1055 5bd794-5bd79b 1053->1055 1055->1044 1057 5bd79d 1055->1057 1061 5bd7a2-5bd7a5 1057->1061 1059->1061 1062 584a59-584a64 1059->1062 1063 5bd869 1060->1063 1064 5bd880-5bd884 1060->1064 1065 5bd7ab-5bd7c9 1061->1065 1066 584a93-584aaa GetCurrentProcess IsWow64Process 1061->1066 1067 5bd7ea-5bd7f0 1062->1067 1068 584a6a-584a6c 1062->1068 1069 5bd86c 1063->1069 1071 5bd86f-5bd878 1064->1071 1072 5bd886-5bd88f 1064->1072 1065->1066 1070 5bd7cf-5bd7d5 1065->1070 1073 584aac 1066->1073 1074 584aaf-584ac0 1066->1074 1079 5bd7fa-5bd800 1067->1079 1080 5bd7f2-5bd7f5 1067->1080 1075 584a72-584a75 1068->1075 1076 5bd805-5bd811 1068->1076 1069->1071 1077 5bd7df-5bd7e5 1070->1077 1078 5bd7d7-5bd7da 1070->1078 1071->1064 1072->1069 1081 5bd891-5bd894 1072->1081 1073->1074 1082 584b2b-584b35 GetSystemInfo 1074->1082 1083 584ac2-584ad2 call 584b37 1074->1083 1084 584a7b-584a8a 1075->1084 1085 5bd831-5bd834 1075->1085 1087 5bd81b-5bd821 1076->1087 1088 5bd813-5bd816 1076->1088 1077->1066 1078->1066 1079->1066 1080->1066 1081->1071 1086 584af8-584b08 1082->1086 1094 584b1f-584b29 GetSystemInfo 1083->1094 1095 584ad4-584ae1 call 584b37 1083->1095 1090 584a90 1084->1090 1091 5bd826-5bd82c 1084->1091 1085->1066 1093 5bd83a-5bd84f 1085->1093 1087->1066 1088->1066 1090->1066 1091->1066 1096 5bd859-5bd85f 1093->1096 1097 5bd851-5bd854 1093->1097 1098 584ae9-584aed 1094->1098 1102 584b18-584b1d 1095->1102 1103 584ae3-584ae7 GetNativeSystemInfo 1095->1103 1096->1066 1097->1066 1098->1086 1101 584aef-584af2 FreeLibrary 1098->1101 1101->1086 1102->1103 1103->1098
                                                  APIs
                                                  • GetVersionExW.KERNEL32(?), ref: 005849CD
                                                    • Part of subcall function 00587BCC: _memmove.LIBCMT ref: 00587C06
                                                  • GetCurrentProcess.KERNEL32(?,0060FAEC,00000000,00000000,?), ref: 00584A9A
                                                  • IsWow64Process.KERNEL32(00000000), ref: 00584AA1
                                                  • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00584AE7
                                                  • FreeLibrary.KERNEL32(00000000), ref: 00584AF2
                                                  • GetSystemInfo.KERNEL32(00000000), ref: 00584B23
                                                  • GetSystemInfo.KERNEL32(00000000), ref: 00584B2F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                  • String ID:
                                                  • API String ID: 1986165174-0
                                                  • Opcode ID: 8f0aaf09133467a2027a4e899c5ce03a842351a30d6d5bb6ae43d02179a4acec
                                                  • Instruction ID: 72ef6e61faa4d706509f642c651b6261040692e78d583a02aa667d0f8d0772c2
                                                  • Opcode Fuzzy Hash: 8f0aaf09133467a2027a4e899c5ce03a842351a30d6d5bb6ae43d02179a4acec
                                                  • Instruction Fuzzy Hash: D491C6319897C1DAC735EB7884501EEBFF5BF29300B544DAED8C6A7A41D620F508CB69

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1104 584e89-584ea1 CreateStreamOnHGlobal 1105 584ec1-584ec6 1104->1105 1106 584ea3-584eba FindResourceExW 1104->1106 1107 5bd933-5bd942 LoadResource 1106->1107 1108 584ec0 1106->1108 1107->1108 1109 5bd948-5bd956 SizeofResource 1107->1109 1108->1105 1109->1108 1110 5bd95c-5bd967 LockResource 1109->1110 1110->1108 1111 5bd96d-5bd98b 1110->1111 1111->1108
                                                  APIs
                                                  • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00584D8E,?,?,00000000,00000000), ref: 00584E99
                                                  • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00584D8E,?,?,00000000,00000000), ref: 00584EB0
                                                  • LoadResource.KERNEL32(?,00000000,?,?,00584D8E,?,?,00000000,00000000,?,?,?,?,?,?,00584E2F), ref: 005BD937
                                                  • SizeofResource.KERNEL32(?,00000000,?,?,00584D8E,?,?,00000000,00000000,?,?,?,?,?,?,00584E2F), ref: 005BD94C
                                                  • LockResource.KERNEL32(00584D8E,?,?,00584D8E,?,?,00000000,00000000,?,?,?,?,?,?,00584E2F,00000000), ref: 005BD95F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                  • String ID: SCRIPT
                                                  • API String ID: 3051347437-3967369404
                                                  • Opcode ID: 25dae1aa89a8f18f6b23dadc1ef1d13d4e9a1e59b407eaf0969edccc3e03ede9
                                                  • Instruction ID: 8c4a8375be6fdc97ada55afb25aa1616589132311384850f52a0e56f354cf466
                                                  • Opcode Fuzzy Hash: 25dae1aa89a8f18f6b23dadc1ef1d13d4e9a1e59b407eaf0969edccc3e03ede9
                                                  • Instruction Fuzzy Hash: 30115A75280701BFD7219BA5EC48F677BBEFBC5B11F208268F80696650EB61E8008A61
                                                  APIs
                                                  • GetFileAttributesW.KERNELBASE(?,005BE398), ref: 005E446A
                                                  • FindFirstFileW.KERNELBASE(?,?), ref: 005E447B
                                                  • FindClose.KERNEL32(00000000), ref: 005E448B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: FileFind$AttributesCloseFirst
                                                  • String ID:
                                                  • API String ID: 48322524-0
                                                  • Opcode ID: 10dac8391ed841cad195e56f145a75ecf7435401245a9556f2aa5bb0b56a72f1
                                                  • Instruction ID: 7a3ee0ee570db123eff614ae237c23b93fcec658a301e86f81a48e42cbb4165c
                                                  • Opcode Fuzzy Hash: 10dac8391ed841cad195e56f145a75ecf7435401245a9556f2aa5bb0b56a72f1
                                                  • Instruction Fuzzy Hash: 7AE0D832510541678724AB78EC0D4EE7B9DAE05335F100715F975C14D0E7B45D0099D5
                                                  APIs
                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00590A5B
                                                  • timeGetTime.WINMM ref: 00590D16
                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00590E53
                                                  • Sleep.KERNEL32(0000000A), ref: 00590E61
                                                  • LockWindowUpdate.USER32(00000000,?,?), ref: 00590EFA
                                                  • DestroyWindow.USER32 ref: 00590F06
                                                  • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00590F20
                                                  • Sleep.KERNEL32(0000000A,?,?), ref: 005C4E83
                                                  • TranslateMessage.USER32(?), ref: 005C5C60
                                                  • DispatchMessageW.USER32(?), ref: 005C5C6E
                                                  • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 005C5C82
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                                  • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$pbd$pbd$pbd$pbd
                                                  • API String ID: 4212290369-1423700736
                                                  • Opcode ID: 799b4dbda275aaecbdcdb880b432fd041766b2742517b464d09ba2458ce3badb
                                                  • Instruction ID: d8f3defba81adb02cfbe5ce273c84df7990eeaa220f78329ea86dccba06e4e0a
                                                  • Opcode Fuzzy Hash: 799b4dbda275aaecbdcdb880b432fd041766b2742517b464d09ba2458ce3badb
                                                  • Instruction Fuzzy Hash: 72B2A270608742DFDB24DFA4C888F6ABFE5BF85304F14491DE49A972A1D771E885CB82

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 005E8F5F: __time64.LIBCMT ref: 005E8F69
                                                    • Part of subcall function 00584EE5: _fseek.LIBCMT ref: 00584EFD
                                                  • __wsplitpath.LIBCMT ref: 005E9234
                                                    • Part of subcall function 005A40FB: __wsplitpath_helper.LIBCMT ref: 005A413B
                                                  • _wcscpy.LIBCMT ref: 005E9247
                                                  • _wcscat.LIBCMT ref: 005E925A
                                                  • __wsplitpath.LIBCMT ref: 005E927F
                                                  • _wcscat.LIBCMT ref: 005E9295
                                                  • _wcscat.LIBCMT ref: 005E92A8
                                                    • Part of subcall function 005E8FA5: _memmove.LIBCMT ref: 005E8FDE
                                                    • Part of subcall function 005E8FA5: _memmove.LIBCMT ref: 005E8FED
                                                  • _wcscmp.LIBCMT ref: 005E91EF
                                                    • Part of subcall function 005E9734: _wcscmp.LIBCMT ref: 005E9824
                                                    • Part of subcall function 005E9734: _wcscmp.LIBCMT ref: 005E9837
                                                  • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 005E9452
                                                  • _wcsncpy.LIBCMT ref: 005E94C5
                                                  • DeleteFileW.KERNEL32(?,?), ref: 005E94FB
                                                  • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 005E9511
                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 005E9522
                                                  • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 005E9534
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                  • String ID:
                                                  • API String ID: 1500180987-0
                                                  • Opcode ID: 384f74b4f7b053629f57575bfcb9a0b1de736ca31b0c3823717589c2df76d0aa
                                                  • Instruction ID: 232ef0ac5c04c75be06e62aa93178bee5ad23b21c8c1d9c76c5baa84700490f3
                                                  • Opcode Fuzzy Hash: 384f74b4f7b053629f57575bfcb9a0b1de736ca31b0c3823717589c2df76d0aa
                                                  • Instruction Fuzzy Hash: 25C14DB1D0021AAADF25DF95CC85ADEBBBDFF95300F0044AAF649E7151EB309A448F61

                                                  Control-flow Graph

                                                  APIs
                                                  • GetSysColorBrush.USER32(0000000F), ref: 00583074
                                                  • RegisterClassExW.USER32(00000030), ref: 0058309E
                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 005830AF
                                                  • InitCommonControlsEx.COMCTL32(?), ref: 005830CC
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 005830DC
                                                  • LoadIconW.USER32(000000A9), ref: 005830F2
                                                  • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00583101
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                  • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                  • API String ID: 2914291525-1005189915
                                                  • Opcode ID: 442565c0ea6426749c46d68f248733998e88c2ea195d1d82918ea45a434214ae
                                                  • Instruction ID: 4f66e9180c92a16577ed55a03f10c5212ebd9e3a2f22fb8f35d7e9544f55cac4
                                                  • Opcode Fuzzy Hash: 442565c0ea6426749c46d68f248733998e88c2ea195d1d82918ea45a434214ae
                                                  • Instruction Fuzzy Hash: 4D315871881358AFDB10CFA4E888ADABFF1FB0A310F14556EE981E62A1D7B50545CF51

                                                  Control-flow Graph

                                                  APIs
                                                  • GetSysColorBrush.USER32(0000000F), ref: 00583074
                                                  • RegisterClassExW.USER32(00000030), ref: 0058309E
                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 005830AF
                                                  • InitCommonControlsEx.COMCTL32(?), ref: 005830CC
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 005830DC
                                                  • LoadIconW.USER32(000000A9), ref: 005830F2
                                                  • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00583101
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                  • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                  • API String ID: 2914291525-1005189915
                                                  • Opcode ID: 43d380204907f5fedb338d1fdf9823726324e64d77d9062fbbed5708529652c9
                                                  • Instruction ID: c7ea13d3c3e66931b742974689c27ad2ff015c1e7574f98d27f03153f4c10d85
                                                  • Opcode Fuzzy Hash: 43d380204907f5fedb338d1fdf9823726324e64d77d9062fbbed5708529652c9
                                                  • Instruction Fuzzy Hash: 0521F7B5941618AFDB10DFA4EC49B9EBBF6FB09700F00512AF912A62A1DBB145448F91

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 00584706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,006452F8,?,005837AE,?), ref: 00584724
                                                    • Part of subcall function 005A050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00587165), ref: 005A052D
                                                  • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 005871A8
                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 005BE8C8
                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 005BE909
                                                  • RegCloseKey.ADVAPI32(?), ref: 005BE947
                                                  • _wcscat.LIBCMT ref: 005BE9A0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                  • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                  • API String ID: 2673923337-2727554177
                                                  • Opcode ID: 81b7198f8924461c629460655d651e99e2145ffcb1ef6383b585b44c5fcd764f
                                                  • Instruction ID: be51738d9294407bf99e6660a8fac5b9d1bafbe7a253aecf10c01170f5b35aec
                                                  • Opcode Fuzzy Hash: 81b7198f8924461c629460655d651e99e2145ffcb1ef6383b585b44c5fcd764f
                                                  • Instruction Fuzzy Hash: 0C718075508302AEC314EF25E8469ABBFE9FF8A310F54152EF445971A0EBB1DA48CB52

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 760 583633-583681 762 5836e1-5836e3 760->762 763 583683-583686 760->763 762->763 764 5836e5 762->764 765 583688-58368f 763->765 766 5836e7 763->766 767 5836ca-5836d2 DefWindowProcW 764->767 770 58374b-583753 PostQuitMessage 765->770 771 583695-58369a 765->771 768 5836ed-5836f0 766->768 769 5bd0cc-5bd0fa call 591070 call 591093 766->769 778 5836d8-5836de 767->778 772 5836f2-5836f3 768->772 773 583715-58373c SetTimer RegisterWindowMessageW 768->773 807 5bd0ff-5bd106 769->807 777 583711-583713 770->777 775 5836a0-5836a2 771->775 776 5bd154-5bd168 call 5e2527 771->776 779 5836f9-58370c KillTimer call 58443a call 583114 772->779 780 5bd06f-5bd072 772->780 773->777 782 58373e-583749 CreatePopupMenu 773->782 783 5836a8-5836ad 775->783 784 583755-583764 call 5844a0 775->784 776->777 801 5bd16e 776->801 777->778 779->777 786 5bd0a8-5bd0c7 MoveWindow 780->786 787 5bd074-5bd076 780->787 782->777 790 5bd139-5bd140 783->790 791 5836b3-5836b8 783->791 784->777 786->777 794 5bd078-5bd07b 787->794 795 5bd097-5bd0a3 SetFocus 787->795 790->767 797 5bd146-5bd14f call 5d7c36 790->797 799 5836be-5836c4 791->799 800 5bd124-5bd134 call 5e2d36 791->800 794->799 803 5bd081-5bd092 call 591070 794->803 795->777 797->767 799->767 799->807 800->777 801->767 803->777 807->767 811 5bd10c-5bd11f call 58443a call 58434a 807->811 811->767
                                                  APIs
                                                  • DefWindowProcW.USER32(?,?,?,?), ref: 005836D2
                                                  • KillTimer.USER32(?,00000001), ref: 005836FC
                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0058371F
                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0058372A
                                                  • CreatePopupMenu.USER32 ref: 0058373E
                                                  • PostQuitMessage.USER32(00000000), ref: 0058374D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                  • String ID: TaskbarCreated$%a
                                                  • API String ID: 129472671-1921608952
                                                  • Opcode ID: 8f483a5e92f606fd7486a24a0b62cdce1a3f3fac1c9e137e2f7ad2da25b0a7da
                                                  • Instruction ID: e2391fb59bf3e214803d098818fd82bebd94888e5404bea22a0cf8f814d45403
                                                  • Opcode Fuzzy Hash: 8f483a5e92f606fd7486a24a0b62cdce1a3f3fac1c9e137e2f7ad2da25b0a7da
                                                  • Instruction Fuzzy Hash: EE41E7B1200506EBDB247F68DC0DBBE3F56FB45700F141925FD03E62A2EAA19F419762

                                                  Control-flow Graph

                                                  APIs
                                                  • GetSysColorBrush.USER32(0000000F), ref: 00583A50
                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 00583A5F
                                                  • LoadIconW.USER32(00000063), ref: 00583A76
                                                  • LoadIconW.USER32(000000A4), ref: 00583A88
                                                  • LoadIconW.USER32(000000A2), ref: 00583A9A
                                                  • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00583AC0
                                                  • RegisterClassExW.USER32(?), ref: 00583B16
                                                    • Part of subcall function 00583041: GetSysColorBrush.USER32(0000000F), ref: 00583074
                                                    • Part of subcall function 00583041: RegisterClassExW.USER32(00000030), ref: 0058309E
                                                    • Part of subcall function 00583041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 005830AF
                                                    • Part of subcall function 00583041: InitCommonControlsEx.COMCTL32(?), ref: 005830CC
                                                    • Part of subcall function 00583041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 005830DC
                                                    • Part of subcall function 00583041: LoadIconW.USER32(000000A9), ref: 005830F2
                                                    • Part of subcall function 00583041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00583101
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                  • String ID: #$0$AutoIt v3
                                                  • API String ID: 423443420-4155596026
                                                  • Opcode ID: a70d2f4657c40874761708cd09659b8f99d870a4f3bd1274619f90d4cc49ddf5
                                                  • Instruction ID: 98be71f57c26b30e3ea97745ed480fbf9dc8accecbb2a25983b40bfaa7c6b2dc
                                                  • Opcode Fuzzy Hash: a70d2f4657c40874761708cd09659b8f99d870a4f3bd1274619f90d4cc49ddf5
                                                  • Instruction Fuzzy Hash: 16215E74D40704AFEB11DFA4EC09B9E7FB6FB09711F00111AF501A62A2D3F556408F95

                                                  Control-flow Graph

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                  • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$Rd
                                                  • API String ID: 1825951767-3741555405
                                                  • Opcode ID: f9b22e7fa2e0804f1cbbb98a1aa984a49d4d3d287b9e050d10c45366d7093b2a
                                                  • Instruction ID: 88ddda5275d9488fc8fb22e2da00de639b3f1670e89c547cf77a615b52eeb3a4
                                                  • Opcode Fuzzy Hash: f9b22e7fa2e0804f1cbbb98a1aa984a49d4d3d287b9e050d10c45366d7093b2a
                                                  • Instruction Fuzzy Hash: 65A14F7290021E9ACB14FBA4DC599FEBF79BF55700F44042AF816B7192EF745A08CB60

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 005A0162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 005A0193
                                                    • Part of subcall function 005A0162: MapVirtualKeyW.USER32(00000010,00000000), ref: 005A019B
                                                    • Part of subcall function 005A0162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 005A01A6
                                                    • Part of subcall function 005A0162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 005A01B1
                                                    • Part of subcall function 005A0162: MapVirtualKeyW.USER32(00000011,00000000), ref: 005A01B9
                                                    • Part of subcall function 005A0162: MapVirtualKeyW.USER32(00000012,00000000), ref: 005A01C1
                                                    • Part of subcall function 005960F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0058F930), ref: 00596154
                                                  • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0058F9CD
                                                  • OleInitialize.OLE32(00000000), ref: 0058FA4A
                                                  • CloseHandle.KERNEL32(00000000), ref: 005C45C8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                  • String ID: <Wd$\Td$%a$Sd
                                                  • API String ID: 1986988660-309962789
                                                  • Opcode ID: af3f535c8f6100745f59520e44a316fca6aa6d939604aad72da13ebad21ef67f
                                                  • Instruction ID: 1de590d05d26ccfcfe5532b02eb72dcee802ca7bcd632fe682eb26dd8cd9df62
                                                  • Opcode Fuzzy Hash: af3f535c8f6100745f59520e44a316fca6aa6d939604aad72da13ebad21ef67f
                                                  • Instruction Fuzzy Hash: F581AAB8901A41CFC384EF39A8446697FE7FB9A316794A13AD41BCB263EB704484CF51

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 983 f987f0-f9889e call f961d0 986 f988a5-f988cb call f99700 CreateFileW 983->986 989 f988cd 986->989 990 f988d2-f988e2 986->990 991 f98a1d-f98a21 989->991 997 f988e9-f98903 VirtualAlloc 990->997 998 f988e4 990->998 992 f98a63-f98a66 991->992 993 f98a23-f98a27 991->993 999 f98a69-f98a70 992->999 995 f98a29-f98a2c 993->995 996 f98a33-f98a37 993->996 995->996 1002 f98a39-f98a43 996->1002 1003 f98a47-f98a4b 996->1003 1004 f9890a-f98921 ReadFile 997->1004 1005 f98905 997->1005 998->991 1000 f98a72-f98a7d 999->1000 1001 f98ac5-f98ada 999->1001 1006 f98a7f 1000->1006 1007 f98a81-f98a8d 1000->1007 1008 f98aea-f98af2 1001->1008 1009 f98adc-f98ae7 VirtualFree 1001->1009 1002->1003 1010 f98a5b 1003->1010 1011 f98a4d-f98a57 1003->1011 1012 f98928-f98968 VirtualAlloc 1004->1012 1013 f98923 1004->1013 1005->991 1006->1001 1016 f98a8f-f98a9f 1007->1016 1017 f98aa1-f98aad 1007->1017 1009->1008 1010->992 1011->1010 1014 f9896a 1012->1014 1015 f9896f-f9898a call f99950 1012->1015 1013->991 1014->991 1023 f98995-f9899f 1015->1023 1019 f98ac3 1016->1019 1020 f98aba-f98ac0 1017->1020 1021 f98aaf-f98ab8 1017->1021 1019->999 1020->1019 1021->1019 1024 f989a1-f989d0 call f99950 1023->1024 1025 f989d2-f989e6 call f99760 1023->1025 1024->1023 1031 f989e8 1025->1031 1032 f989ea-f989ee 1025->1032 1031->991 1033 f989fa-f989fe 1032->1033 1034 f989f0-f989f4 CloseHandle 1032->1034 1035 f98a0e-f98a17 1033->1035 1036 f98a00-f98a0b VirtualFree 1033->1036 1034->1033 1035->986 1035->991 1036->1035
                                                  APIs
                                                  • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00F988C1
                                                  • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00F98AE7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127970985.0000000000F96000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F96000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_f96000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CreateFileFreeVirtual
                                                  • String ID:
                                                  • API String ID: 204039940-0
                                                  • Opcode ID: c69e8af538ca099f1199ea1a41374fe769c00d7324591793f5319154b009097c
                                                  • Instruction ID: cc3da099ccdfa60f3c83fbd71fdde917e95885d68709f6f72bd00f5c9a24579e
                                                  • Opcode Fuzzy Hash: c69e8af538ca099f1199ea1a41374fe769c00d7324591793f5319154b009097c
                                                  • Instruction Fuzzy Hash: A4A12870E00209EBEF14CFA4C894BEEBBB5BF49714F208559E101BB280CB799A81DF55

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1114 5839d5-583a45 CreateWindowExW * 2 ShowWindow * 2
                                                  APIs
                                                  • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00583A03
                                                  • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00583A24
                                                  • ShowWindow.USER32(00000000,?,?), ref: 00583A38
                                                  • ShowWindow.USER32(00000000,?,?), ref: 00583A41
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Window$CreateShow
                                                  • String ID: AutoIt v3$edit
                                                  • API String ID: 1584632944-3779509399
                                                  • Opcode ID: 84983956aa3f5a783ec46f35dd6cbc4e2371c34206502745ff30efcf646661e6
                                                  • Instruction ID: 3be7ac8c335ff52ce1d2edf6d672bc19273122e35ead1859b6337bdc37809dbf
                                                  • Opcode Fuzzy Hash: 84983956aa3f5a783ec46f35dd6cbc4e2371c34206502745ff30efcf646661e6
                                                  • Instruction Fuzzy Hash: 87F03478680290BFEB315B27AC08E2B3E7FE7C7F50B00102AB901A21B1C2A10C00CAB0

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1115 f98580-f986eb call f961d0 call f98470 CreateFileW 1122 f986ed 1115->1122 1123 f986f2-f98702 1115->1123 1124 f987a2-f987a7 1122->1124 1126 f98709-f98723 VirtualAlloc 1123->1126 1127 f98704 1123->1127 1128 f98725 1126->1128 1129 f98727-f9873e ReadFile 1126->1129 1127->1124 1128->1124 1130 f98740 1129->1130 1131 f98742-f9877c call f984b0 call f97470 1129->1131 1130->1124 1136 f98798-f987a0 ExitProcess 1131->1136 1137 f9877e-f98793 call f98500 1131->1137 1136->1124 1137->1136
                                                  APIs
                                                    • Part of subcall function 00F98470: Sleep.KERNELBASE(000001F4), ref: 00F98481
                                                  • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00F986E1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127970985.0000000000F96000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F96000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_f96000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CreateFileSleep
                                                  • String ID: ZYVQOZSTCM5UZ0DFQFP139D
                                                  • API String ID: 2694422964-1514645776
                                                  • Opcode ID: 6f9a7b7cdc9dd790f6055809a8184deb071c3a40ca73469d93055449087eec24
                                                  • Instruction ID: 8e1da2b65a3be6cf328a806543504cf6282a592f1bd3cbcb824ea7eee5410b42
                                                  • Opcode Fuzzy Hash: 6f9a7b7cdc9dd790f6055809a8184deb071c3a40ca73469d93055449087eec24
                                                  • Instruction Fuzzy Hash: 2D619030D14288DAEF11DBE4C854BEEBB75AF19304F144199E248BB2C1D6BA1B45CBA6

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1139 58407c-584092 1140 584098-5840ad call 587a16 1139->1140 1141 58416f-584173 1139->1141 1144 5bd3c8-5bd3d7 LoadStringW 1140->1144 1145 5840b3-5840d3 call 587bcc 1140->1145 1148 5bd3e2-5bd3fa call 587b2e call 586fe3 1144->1148 1145->1148 1149 5840d9-5840dd 1145->1149 1157 5840ed-58416a call 5a2de0 call 58454e call 5a2dbc Shell_NotifyIconW call 585904 1148->1157 1161 5bd400-5bd41e call 587cab call 586fe3 call 587cab 1148->1161 1151 5840e3-5840e8 call 587b2e 1149->1151 1152 584174-58417d call 588047 1149->1152 1151->1157 1152->1157 1157->1141 1161->1157
                                                  APIs
                                                  • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 005BD3D7
                                                    • Part of subcall function 00587BCC: _memmove.LIBCMT ref: 00587C06
                                                  • _memset.LIBCMT ref: 005840FC
                                                  • _wcscpy.LIBCMT ref: 00584150
                                                  • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00584160
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                  • String ID: Line:
                                                  • API String ID: 3942752672-1585850449
                                                  • Opcode ID: 246476652cd32f98666afdf30dfd2e225b44f96bdebcab6425596d90f35f7eef
                                                  • Instruction ID: d7c5dbeffe6b44f6a0ba6dba57b32211f519bf9062700fe43180fc762c460b79
                                                  • Opcode Fuzzy Hash: 246476652cd32f98666afdf30dfd2e225b44f96bdebcab6425596d90f35f7eef
                                                  • Instruction Fuzzy Hash: 69318671008706AFD721FB50DC49FDB7BD9BF95314F20491AF985A6092EB709648CB92
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                  • String ID:
                                                  • API String ID: 1559183368-0
                                                  • Opcode ID: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                                  • Instruction ID: 2f80f1eff0c48bdbfe0d7c041afb9b602dfc6be7d433b2a8eeceac26048a08e9
                                                  • Opcode Fuzzy Hash: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                                  • Instruction Fuzzy Hash: EB51A470E00B05DBDF248E69D844A6E7FA6BF4A321F248729F825962D1F771DD508B40
                                                  APIs
                                                    • Part of subcall function 00584DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,006452F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00584E0F
                                                  • _free.LIBCMT ref: 005BE263
                                                  • _free.LIBCMT ref: 005BE2AA
                                                    • Part of subcall function 00586A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00586BAD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _free$CurrentDirectoryLibraryLoad
                                                  • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                  • API String ID: 2861923089-1757145024
                                                  • Opcode ID: a036548d74b246a22ff9ebaf72df1769683ec997a88f72736ff4806609087326
                                                  • Instruction ID: 0ae754da15ae9082edc3a2dc40a232573cc3f1099f4b77d88290b73e8d37bf49
                                                  • Opcode Fuzzy Hash: a036548d74b246a22ff9ebaf72df1769683ec997a88f72736ff4806609087326
                                                  • Instruction Fuzzy Hash: 51915F7191021A9FCF14EFA4CC8A9EDBBB9FF59310F14442AF815AB2A1DB70A905CB50
                                                  APIs
                                                  • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,005835A1,SwapMouseButtons,00000004,?), ref: 005835D4
                                                  • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,005835A1,SwapMouseButtons,00000004,?,?,?,?,00582754), ref: 005835F5
                                                  • RegCloseKey.KERNELBASE(00000000,?,?,005835A1,SwapMouseButtons,00000004,?,?,?,?,00582754), ref: 00583617
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID: Control Panel\Mouse
                                                  • API String ID: 3677997916-824357125
                                                  • Opcode ID: efa2e0ebd6f2db5f8982fbc646fb0c7e17d6845c326bc4cf7dd843cb81868243
                                                  • Instruction ID: b5ab07bf1e4e1006bf573ffc80d5e8495d0df5f8d6c3544de4122154d6b6a16e
                                                  • Opcode Fuzzy Hash: efa2e0ebd6f2db5f8982fbc646fb0c7e17d6845c326bc4cf7dd843cb81868243
                                                  • Instruction Fuzzy Hash: 42115771610208BFDB20AF69DC80EAFBBB9FF04B40F009469F805E7210E2719F409BA0
                                                  APIs
                                                  • CreateProcessW.KERNELBASE(?,00000000), ref: 00F97C9D
                                                  • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00F97CC1
                                                  • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00F97CE3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127970985.0000000000F96000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F96000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_f96000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                  • String ID:
                                                  • API String ID: 2438371351-0
                                                  • Opcode ID: d21c280c783bbae91a429f84d87e257f256d4475b71677e5b67df5fe47b3db5a
                                                  • Instruction ID: 5e24be73d34010fdaf5dead104d307a5c1500ce99dce45eaf2a23b6e723c3a7b
                                                  • Opcode Fuzzy Hash: d21c280c783bbae91a429f84d87e257f256d4475b71677e5b67df5fe47b3db5a
                                                  • Instruction Fuzzy Hash: C3620C30A143589BEB24DFA4C841BDEB376EF58300F1091A9E10DEB394E7759E81DB59
                                                  APIs
                                                    • Part of subcall function 00584EE5: _fseek.LIBCMT ref: 00584EFD
                                                    • Part of subcall function 005E9734: _wcscmp.LIBCMT ref: 005E9824
                                                    • Part of subcall function 005E9734: _wcscmp.LIBCMT ref: 005E9837
                                                  • _free.LIBCMT ref: 005E96A2
                                                  • _free.LIBCMT ref: 005E96A9
                                                  • _free.LIBCMT ref: 005E9714
                                                    • Part of subcall function 005A2D55: RtlFreeHeap.NTDLL(00000000,00000000,?,005A9A24), ref: 005A2D69
                                                    • Part of subcall function 005A2D55: GetLastError.KERNEL32(00000000,?,005A9A24), ref: 005A2D7B
                                                  • _free.LIBCMT ref: 005E971C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                  • String ID:
                                                  • API String ID: 1552873950-0
                                                  • Opcode ID: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                  • Instruction ID: 51fbad9fdd38ac5abe4d0d4c3e749c8c83d5cf2bd6a2f6330cc20d87ba2c6942
                                                  • Opcode Fuzzy Hash: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                  • Instruction Fuzzy Hash: 655150B1D04259ABDF249F65CC85AAEBB79FF88300F10449EF649A3251DB715A80CF58
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                  • String ID:
                                                  • API String ID: 2782032738-0
                                                  • Opcode ID: aad2f5e608f8efba43aac6e934a71f9fe2258905eab53e1ccdd764cf28e9f888
                                                  • Instruction ID: 15357a2626c5a3e0d74314a2bbd320e1bfca65624eb45b1262e82ee870a70abe
                                                  • Opcode Fuzzy Hash: aad2f5e608f8efba43aac6e934a71f9fe2258905eab53e1ccdd764cf28e9f888
                                                  • Instruction Fuzzy Hash: 8441D374A007869BDB188EE9D8849AE7FA5FFC3360B24853DE81587640D7B4DD428F50
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _memmove
                                                  • String ID: AU3!P/a$EA06
                                                  • API String ID: 4104443479-2581651543
                                                  • Opcode ID: 6e42504b51969ce43d03d2b2668e8bcfe56de89207591b08d36a38ff1ea0fac7
                                                  • Instruction ID: 6fd6bbf00a90b65557a5568994b88743c25901f5f08847322887fa1ae420e3ad
                                                  • Opcode Fuzzy Hash: 6e42504b51969ce43d03d2b2668e8bcfe56de89207591b08d36a38ff1ea0fac7
                                                  • Instruction Fuzzy Hash: C0416D32A0525B57CF21BB64CC557BE7FB6BB85300F684475FC82BB282D6209D448FA1
                                                  APIs
                                                  • _memset.LIBCMT ref: 005BEA39
                                                  • GetOpenFileNameW.COMDLG32(?), ref: 005BEA83
                                                    • Part of subcall function 00584750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00584743,?,?,005837AE,?), ref: 00584770
                                                    • Part of subcall function 005A0791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 005A07B0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Name$Path$FileFullLongOpen_memset
                                                  • String ID: X
                                                  • API String ID: 3777226403-3081909835
                                                  • Opcode ID: c042070bb3d11ee064f9f6a3edb867455cd675e63dc4218284fdacc18709686a
                                                  • Instruction ID: 0bd7844469c64e7497757baa67d066d46184993e24788aa7f5f295ee120ada30
                                                  • Opcode Fuzzy Hash: c042070bb3d11ee064f9f6a3edb867455cd675e63dc4218284fdacc18709686a
                                                  • Instruction Fuzzy Hash: 1521C630A002499BDB51AF94C849BEE7FFDBF89314F104019F809B7241DBB459898F91
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: __fread_nolock_memmove
                                                  • String ID: EA06
                                                  • API String ID: 1988441806-3962188686
                                                  • Opcode ID: ef498ad66a2827e7abe95f16150ec588bedf73ed1b3256e64438deecdcde6ac4
                                                  • Instruction ID: 6a82131f1928f3dbb962140e1f5982cca1190584a9c65295d6be0d906df69470
                                                  • Opcode Fuzzy Hash: ef498ad66a2827e7abe95f16150ec588bedf73ed1b3256e64438deecdcde6ac4
                                                  • Instruction Fuzzy Hash: 6401F971C042587EDB28CBA8CC1AEFE7FF8DB15301F00459AF596D2181E875A60487A0
                                                  APIs
                                                  • GetTempPathW.KERNEL32(00000104,?), ref: 005E98F8
                                                  • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 005E990F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Temp$FileNamePath
                                                  • String ID: aut
                                                  • API String ID: 3285503233-3010740371
                                                  • Opcode ID: d5b7a56a70741bc0fdedb8a65c9796deee09f03d6f61c3af983075f068b361a7
                                                  • Instruction ID: 5ef1eea80cab3a45700d0dd64c62d030c3d7821a3c51297a9cd06d5ac9433fbc
                                                  • Opcode Fuzzy Hash: d5b7a56a70741bc0fdedb8a65c9796deee09f03d6f61c3af983075f068b361a7
                                                  • Instruction Fuzzy Hash: C1D05E7958030DABDB609BE0DC0EFDB773DE704700F0002B1BA94920A1EAB0A6988B91
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 306690ad216be494b7b30cc3e1d0df57d9eb0242b052d8b98b927d9f34012f0e
                                                  • Instruction ID: 42f79ac847d074cd02ac6990f8231e44cabf62c9763c6018b943692be3079c4c
                                                  • Opcode Fuzzy Hash: 306690ad216be494b7b30cc3e1d0df57d9eb0242b052d8b98b927d9f34012f0e
                                                  • Instruction Fuzzy Hash: 38F146706083499FCB14DF28C584A6ABFE5FF88314F14892EF9999B251D734E945CF82
                                                  APIs
                                                  • _memset.LIBCMT ref: 00584370
                                                  • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00584415
                                                  • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00584432
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: IconNotifyShell_$_memset
                                                  • String ID:
                                                  • API String ID: 1505330794-0
                                                  • Opcode ID: cd7e6e748fddaa011d8fd05d51000c0e5812126248415f14778f11a529a4f819
                                                  • Instruction ID: 9612fafbf0b439d627b8cf796cc34083c0ea7bb2e659be258cea7d12b563c3d3
                                                  • Opcode Fuzzy Hash: cd7e6e748fddaa011d8fd05d51000c0e5812126248415f14778f11a529a4f819
                                                  • Instruction Fuzzy Hash: 513181705047028FD721EF24D88569BBBF8FB49308F000D2EED9A92252E7B1AA44CF52
                                                  APIs
                                                  • __FF_MSGBANNER.LIBCMT ref: 005A5733
                                                    • Part of subcall function 005AA16B: __NMSG_WRITE.LIBCMT ref: 005AA192
                                                    • Part of subcall function 005AA16B: __NMSG_WRITE.LIBCMT ref: 005AA19C
                                                  • __NMSG_WRITE.LIBCMT ref: 005A573A
                                                    • Part of subcall function 005AA1C8: GetModuleFileNameW.KERNEL32(00000000,006433BA,00000104,?,00000001,00000000), ref: 005AA25A
                                                    • Part of subcall function 005AA1C8: ___crtMessageBoxW.LIBCMT ref: 005AA308
                                                    • Part of subcall function 005A309F: ___crtCorExitProcess.LIBCMT ref: 005A30A5
                                                    • Part of subcall function 005A309F: ExitProcess.KERNEL32 ref: 005A30AE
                                                    • Part of subcall function 005A8B28: __getptd_noexit.LIBCMT ref: 005A8B28
                                                  • RtlAllocateHeap.NTDLL(00F10000,00000000,00000001,00000000,?,?,?,005A0DD3,?), ref: 005A575F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                  • String ID:
                                                  • API String ID: 1372826849-0
                                                  • Opcode ID: cb2f90d07f0bc04c8e1dc06499c27699a1bcd53d770b61565de37c8811e5b17b
                                                  • Instruction ID: eec7845930718a51da97935b8805849c2e957088621dc79bd4e1ef161ad5710a
                                                  • Opcode Fuzzy Hash: cb2f90d07f0bc04c8e1dc06499c27699a1bcd53d770b61565de37c8811e5b17b
                                                  • Instruction Fuzzy Hash: BB019235240B12EAD7112734EC9AF3E7F58FBC37A1F600526F505AA281FFB099408661
                                                  APIs
                                                  • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,005E9548,?,?,?,?,?,00000004), ref: 005E98BB
                                                  • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,005E9548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 005E98D1
                                                  • CloseHandle.KERNEL32(00000000,?,005E9548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 005E98D8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: File$CloseCreateHandleTime
                                                  • String ID:
                                                  • API String ID: 3397143404-0
                                                  • Opcode ID: 9881548e2a8076094773228b8419097869c0e3142d3c9af410046ff74e92286f
                                                  • Instruction ID: 91893eec252bfab13360d056aef16bb525a04a40359d471ad8e8df8b7deab950
                                                  • Opcode Fuzzy Hash: 9881548e2a8076094773228b8419097869c0e3142d3c9af410046ff74e92286f
                                                  • Instruction Fuzzy Hash: 86E086321C0218B7D7311B54EC09FCB7F1AAB06B70F104220FB54694E087B1151197D8
                                                  APIs
                                                  • _free.LIBCMT ref: 005E8D1B
                                                    • Part of subcall function 005A2D55: RtlFreeHeap.NTDLL(00000000,00000000,?,005A9A24), ref: 005A2D69
                                                    • Part of subcall function 005A2D55: GetLastError.KERNEL32(00000000,?,005A9A24), ref: 005A2D7B
                                                  • _free.LIBCMT ref: 005E8D2C
                                                  • _free.LIBCMT ref: 005E8D3E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                  • Instruction ID: d30db17c08390fe48985eec1ae602cb48f396271310145d1e1690059cdf6bdf0
                                                  • Opcode Fuzzy Hash: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                  • Instruction Fuzzy Hash: 85E012A160164246CB29A57DAE45AA71BDC6F99352B140D1DB44DD7187CE64F8438124
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: CALL
                                                  • API String ID: 0-4196123274
                                                  • Opcode ID: ba521d83af4e25b161de5bea00201bc8eeddee9212ada98423c9aca4c5ed0104
                                                  • Instruction ID: 6e83bf4ff37168d6b560f65170232d7a70f0a3ba327f5b2393509fce9497a658
                                                  • Opcode Fuzzy Hash: ba521d83af4e25b161de5bea00201bc8eeddee9212ada98423c9aca4c5ed0104
                                                  • Instruction Fuzzy Hash: 62225A74508241DFDB24EF14C494A6ABFE5BF85304F14896EF88AAB362D735EC45CB82
                                                  APIs
                                                  • IsThemeActive.UXTHEME ref: 00584834
                                                    • Part of subcall function 005A336C: __lock.LIBCMT ref: 005A3372
                                                    • Part of subcall function 005A336C: DecodePointer.KERNEL32(00000001,?,00584849,005D7C74), ref: 005A337E
                                                    • Part of subcall function 005A336C: EncodePointer.KERNEL32(?,?,00584849,005D7C74), ref: 005A3389
                                                    • Part of subcall function 005848FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00584915
                                                    • Part of subcall function 005848FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0058492A
                                                    • Part of subcall function 00583B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00583B68
                                                    • Part of subcall function 00583B3A: IsDebuggerPresent.KERNEL32 ref: 00583B7A
                                                    • Part of subcall function 00583B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,006452F8,006452E0,?,?), ref: 00583BEB
                                                    • Part of subcall function 00583B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00583C6F
                                                  • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00584874
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                  • String ID:
                                                  • API String ID: 1438897964-0
                                                  • Opcode ID: 0dd7afd04d43c107681da6f520a7127185ff2fd39b3458922976e8b02478e016
                                                  • Instruction ID: f2bc3d2a5001d2465c1d04013af443c158c85ba60282b1755a306f0e928ea235
                                                  • Opcode Fuzzy Hash: 0dd7afd04d43c107681da6f520a7127185ff2fd39b3458922976e8b02478e016
                                                  • Instruction Fuzzy Hash: 79118E719083029BCB00EF28E80991EBFE9FB86754F10491BF84193272DBB09644CF92
                                                  APIs
                                                  • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,00585821,?,?,?,?), ref: 00585CC7
                                                  • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,00585821,?,?,?,?), ref: 005BDD73
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CreateFile
                                                  • String ID:
                                                  • API String ID: 823142352-0
                                                  • Opcode ID: 71f1bbf753ada64dfb268bbc5f82f02e73d577918b0e49910cb906cdd345275e
                                                  • Instruction ID: 2321b970116dbc69d692289f6602dd8ff3ee519a64a6bd4cd5fb4dc209f35d9b
                                                  • Opcode Fuzzy Hash: 71f1bbf753ada64dfb268bbc5f82f02e73d577918b0e49910cb906cdd345275e
                                                  • Instruction Fuzzy Hash: F8014070284708BEF7245E24CC8AF763ADCBB05768F108719BEE5AA1E0D6B55C498F54
                                                  APIs
                                                    • Part of subcall function 005A571C: __FF_MSGBANNER.LIBCMT ref: 005A5733
                                                    • Part of subcall function 005A571C: __NMSG_WRITE.LIBCMT ref: 005A573A
                                                    • Part of subcall function 005A571C: RtlAllocateHeap.NTDLL(00F10000,00000000,00000001,00000000,?,?,?,005A0DD3,?), ref: 005A575F
                                                  • std::exception::exception.LIBCMT ref: 005A0DEC
                                                  • __CxxThrowException@8.LIBCMT ref: 005A0E01
                                                    • Part of subcall function 005A859B: RaiseException.KERNEL32(?,?,?,00639E78,00000000,?,?,?,?,005A0E06,?,00639E78,?,00000001), ref: 005A85F0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                  • String ID:
                                                  • API String ID: 3902256705-0
                                                  • Opcode ID: 802a24e60907e534e2212b24b1788a94b07b189f43660d69ac29a40e7251b91d
                                                  • Instruction ID: 42fdd077042b1606d255a57a0eb5945709dbfe75b1587a9f1223a3c9e145389b
                                                  • Opcode Fuzzy Hash: 802a24e60907e534e2212b24b1788a94b07b189f43660d69ac29a40e7251b91d
                                                  • Instruction Fuzzy Hash: C5F0F93180021B66CF10BA94EC159EE7FACBF07310F000415FD0496181DF709A90D5E1
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: __lock_file_memset
                                                  • String ID:
                                                  • API String ID: 26237723-0
                                                  • Opcode ID: a2627084450b25f0967364cb7bd4e14f0aaad9985343dc69414a9a1967c29dbb
                                                  • Instruction ID: b03bc87bb54d1f9bed4d6d4d0c811966d8dbcf17a3894dd3c153e92eedd9dfcc
                                                  • Opcode Fuzzy Hash: a2627084450b25f0967364cb7bd4e14f0aaad9985343dc69414a9a1967c29dbb
                                                  • Instruction Fuzzy Hash: 8D018471800A0AABCF12AF689D0ACAE7F71BFD3361F544115F9151B191EB318A51DF91
                                                  APIs
                                                    • Part of subcall function 005A8B28: __getptd_noexit.LIBCMT ref: 005A8B28
                                                  • __lock_file.LIBCMT ref: 005A53EB
                                                    • Part of subcall function 005A6C11: __lock.LIBCMT ref: 005A6C34
                                                  • __fclose_nolock.LIBCMT ref: 005A53F6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                  • String ID:
                                                  • API String ID: 2800547568-0
                                                  • Opcode ID: b0f910a57403a37d8ab34970c9e1744c42d6f97b9d31d5e06140125b934762d7
                                                  • Instruction ID: 4f4f676b4c8458c8b248b4b46c13de3511b850ca5cb889447ae7bb49180a7f5a
                                                  • Opcode Fuzzy Hash: b0f910a57403a37d8ab34970c9e1744c42d6f97b9d31d5e06140125b934762d7
                                                  • Instruction Fuzzy Hash: 1EF09631800A069ADF106F659809BBE7EE07FC3374F258905E464AB1C1EBBC49415B61
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,00000000,?,?,?,0058542F,?,?,?,?,?), ref: 0058807A
                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,?,?,?,0058542F,?,?,?,?,?), ref: 005880AD
                                                    • Part of subcall function 0058774D: _memmove.LIBCMT ref: 00587789
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$_memmove
                                                  • String ID:
                                                  • API String ID: 3033907384-0
                                                  • Opcode ID: 347f82a4a0d58017bced3451a4f851b5a021c74b4902c52581cb98d099e07c3f
                                                  • Instruction ID: daff2d5425b50cdf0efcd849097b4101cdd9f656ff7fe883cadd146fb0faf10b
                                                  • Opcode Fuzzy Hash: 347f82a4a0d58017bced3451a4f851b5a021c74b4902c52581cb98d099e07c3f
                                                  • Instruction Fuzzy Hash: 9A018F31201105BEEB247B21DC4AE7B3F6DEB8A360F108029FD05DE190DA6098009661
                                                  APIs
                                                  • CreateProcessW.KERNELBASE(?,00000000), ref: 00F97C9D
                                                  • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00F97CC1
                                                  • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00F97CE3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127970985.0000000000F96000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F96000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_f96000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                  • String ID:
                                                  • API String ID: 2438371351-0
                                                  • Opcode ID: 7bc2eb71131a5ca0d961fb64b4ce1da28befc4a8e94ed8bda1bc50d134690387
                                                  • Instruction ID: 1bdccb19627e81433caebc6ccb58640e1216c3e77ba3bd6d81c2a23db65ca8c0
                                                  • Opcode Fuzzy Hash: 7bc2eb71131a5ca0d961fb64b4ce1da28befc4a8e94ed8bda1bc50d134690387
                                                  • Instruction Fuzzy Hash: D612C124E28658C6EB24DF64D8507DEB232EF68300F1050E9910DEB7A5E77A4F85CF5A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: de56835962733d50a9d3357f821c916755190b2de2af136395288b47b82b31f0
                                                  • Instruction ID: 0665db7a839fd27015172107d8eb5fb203d849f361efe566415232df82fc0044
                                                  • Opcode Fuzzy Hash: de56835962733d50a9d3357f821c916755190b2de2af136395288b47b82b31f0
                                                  • Instruction Fuzzy Hash: E2617A746002469FCB10EF54C895E7ABBE9FF89304F14886DED06A7291DB75ED50CB90
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c71a35e2688291dc2fb31f95ece3518974e7e7067cc88aba113e9e52ecbfb7f8
                                                  • Instruction ID: baefbd78e710066bbdb100b19a9172b0c9526b3da995ff6e0a0c842d2a0ac7d0
                                                  • Opcode Fuzzy Hash: c71a35e2688291dc2fb31f95ece3518974e7e7067cc88aba113e9e52ecbfb7f8
                                                  • Instruction Fuzzy Hash: BD517131600605AFCF14FB68C999FAE7FA6BF85310F144569F806AB392DA30ED01DB51
                                                  APIs
                                                  • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 00585B96
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: 211e38863c46c63db05cdb2c53317384d1f4fe7e2a2cefc5e4104ee1bc604e4f
                                                  • Instruction ID: 4521f63e38f585d541b8a329605af26dfeb61a3533fd75d114e66300b336a748
                                                  • Opcode Fuzzy Hash: 211e38863c46c63db05cdb2c53317384d1f4fe7e2a2cefc5e4104ee1bc604e4f
                                                  • Instruction Fuzzy Hash: 71313C31A00A06AFCB18EF6CC484AADBBB5FF94311F148629DC16A3710E770BD90CB91
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                  • Instruction ID: 68df50c90c69abbd09ba1ea1f0408f76b97f7d49583fe2ecbd282ccc5e2a755b
                                                  • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                  • Instruction Fuzzy Hash: 7831D370A101059BC718DF58C4A4A6DFBA6FB5A320B64A7A5E80ACB391D731EDD1DBC0
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ClearVariant
                                                  • String ID:
                                                  • API String ID: 1473721057-0
                                                  • Opcode ID: d9e9c4514b1c39e68a5de426c081d5120e350631aa4370252a47a938b6a8ca1c
                                                  • Instruction ID: 9d92beeac28220b823bcd4997670747aa1506637a5d8ac077613ab37ef9ef2fe
                                                  • Opcode Fuzzy Hash: d9e9c4514b1c39e68a5de426c081d5120e350631aa4370252a47a938b6a8ca1c
                                                  • Instruction Fuzzy Hash: 5141E7745043419FDB24DF14C458B1ABFE1BF85314F0988ACE8999B762C731EC45CB52
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _memmove
                                                  • String ID:
                                                  • API String ID: 4104443479-0
                                                  • Opcode ID: fffb3be7f04a05edc248804624d98f785d820c5879578716562dd4e183b2f255
                                                  • Instruction ID: b03111ec4aabdade87bec4d739b0cb059d3d500c140c858d182d9d1baaf7d01c
                                                  • Opcode Fuzzy Hash: fffb3be7f04a05edc248804624d98f785d820c5879578716562dd4e183b2f255
                                                  • Instruction Fuzzy Hash: 3B213D71500A09EBCB14AF51EC856AE7FF9FF44310F21886AE486D6051F7B0E8D0DBA5
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _wcscmp
                                                  • String ID:
                                                  • API String ID: 856254489-0
                                                  • Opcode ID: e0208fb52a7636246a25e25758ec41045253bbe551b039999dca276987d211a5
                                                  • Instruction ID: 2352cb2b6702a49c4bf001dd2e2434b36ce8ec39910447210f362be5ea906c13
                                                  • Opcode Fuzzy Hash: e0208fb52a7636246a25e25758ec41045253bbe551b039999dca276987d211a5
                                                  • Instruction Fuzzy Hash: E4116D3290051AABCF14BBA9CC459EEBF79FB95360F50412AFC11B7190EA709A05DBA0
                                                  APIs
                                                    • Part of subcall function 00584BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00584BEF
                                                    • Part of subcall function 005A525B: __wfsopen.LIBCMT ref: 005A5266
                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,006452F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00584E0F
                                                    • Part of subcall function 00584B6A: FreeLibrary.KERNEL32(00000000), ref: 00584BA4
                                                    • Part of subcall function 00584C70: _memmove.LIBCMT ref: 00584CBA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Library$Free$Load__wfsopen_memmove
                                                  • String ID:
                                                  • API String ID: 1396898556-0
                                                  • Opcode ID: 2e069d1bf366a1c37a558920b40cd6280d07a9d236b9b445a99c37ad44e8023e
                                                  • Instruction ID: e89b63dd0bad622d6e78761eb02e56b341f0f053f2669ab6dba38c845f17280a
                                                  • Opcode Fuzzy Hash: 2e069d1bf366a1c37a558920b40cd6280d07a9d236b9b445a99c37ad44e8023e
                                                  • Instruction Fuzzy Hash: D5119131640707ABCF25BF74C81AFAE7BA9BF84711F108829FD41B7181EA719A019F61
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ClearVariant
                                                  • String ID:
                                                  • API String ID: 1473721057-0
                                                  • Opcode ID: 3407facd47e5fafa0b00bc3888c4c24e5bb3af91d7f6c994f87468fffb8a2939
                                                  • Instruction ID: 352c3d3519bbbbcd1d044e0ac532cc62d4e7bae4048306c8fe688842e5b05001
                                                  • Opcode Fuzzy Hash: 3407facd47e5fafa0b00bc3888c4c24e5bb3af91d7f6c994f87468fffb8a2939
                                                  • Instruction Fuzzy Hash: BB212474508342DFDB24EF64C444B2ABBE5BF89314F05896CF88AA7762D731E805CB92
                                                  APIs
                                                  • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,005856A7,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00585C16
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: FileRead
                                                  • String ID:
                                                  • API String ID: 2738559852-0
                                                  • Opcode ID: d1ba46a6d864e1ea1dcc749ae5aca9cb0b3e92b4b56f8b2b228662c9a94af204
                                                  • Instruction ID: cadf717b25cf0600ac7a24d0979e8f76e657ba26487483a426e825a027f3a077
                                                  • Opcode Fuzzy Hash: d1ba46a6d864e1ea1dcc749ae5aca9cb0b3e92b4b56f8b2b228662c9a94af204
                                                  • Instruction Fuzzy Hash: 5B113631200B059FD330DF19C880B62BBE9FF54761F10C92EE9AA97A51E7B0E844CB60
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _memmove
                                                  • String ID:
                                                  • API String ID: 4104443479-0
                                                  • Opcode ID: 9f3ded07322f352e8a10de6e5b29e511e5eed242f4c9ed39c3b1c7becfd31a48
                                                  • Instruction ID: a9f241954533463b44c1770902df88c4a3bed1e6eeb1b428ace01f2e7c409f9b
                                                  • Opcode Fuzzy Hash: 9f3ded07322f352e8a10de6e5b29e511e5eed242f4c9ed39c3b1c7becfd31a48
                                                  • Instruction Fuzzy Hash: DB0184B5200502AFC305EB29C445D2AFBA9FFC6310714456AE959C7702E731FC21CBE0
                                                  APIs
                                                  • __lock_file.LIBCMT ref: 005A48A6
                                                    • Part of subcall function 005A8B28: __getptd_noexit.LIBCMT ref: 005A8B28
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: __getptd_noexit__lock_file
                                                  • String ID:
                                                  • API String ID: 2597487223-0
                                                  • Opcode ID: f9f856a283635fd7d09d2a2ca5ee76f80df67113aa51c398be80d43c65a2b67e
                                                  • Instruction ID: 72e20644cba15b786bcb30c1f9b2caee1018a257294ffbcd491d25a516995a83
                                                  • Opcode Fuzzy Hash: f9f856a283635fd7d09d2a2ca5ee76f80df67113aa51c398be80d43c65a2b67e
                                                  • Instruction Fuzzy Hash: C0F0AF3190064BABDF11AFA49C0A7AE3EA1BF82325F158414B4249B192DBFC8951DF51
                                                  APIs
                                                  • FreeLibrary.KERNEL32(?,?,006452F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00584E7E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: FreeLibrary
                                                  • String ID:
                                                  • API String ID: 3664257935-0
                                                  • Opcode ID: a973fce0f89c6d8abecd0f35b947c90c70f792d3b91afd600dfb81742322e77c
                                                  • Instruction ID: 25f9c34fab97ccea9a40703381041e1f2c680f9786b167631233b8ee8fb74661
                                                  • Opcode Fuzzy Hash: a973fce0f89c6d8abecd0f35b947c90c70f792d3b91afd600dfb81742322e77c
                                                  • Instruction Fuzzy Hash: 41F03971505712CFCB34AF64E494827BFE9BF553293208E7EEAD692620C7329840DF41
                                                  APIs
                                                  • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 005A07B0
                                                    • Part of subcall function 00587BCC: _memmove.LIBCMT ref: 00587C06
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: LongNamePath_memmove
                                                  • String ID:
                                                  • API String ID: 2514874351-0
                                                  • Opcode ID: 4929596300bd938efce4cec6627cf552f961179cea7b06c2f6cdc448acb42273
                                                  • Instruction ID: b9d25b5802d4f8a2ed394fb16aa4435039d3ab83fd4059f6fc7952914b99c83b
                                                  • Opcode Fuzzy Hash: 4929596300bd938efce4cec6627cf552f961179cea7b06c2f6cdc448acb42273
                                                  • Instruction Fuzzy Hash: 43E0CD3694412957C730E6989C09FEA77DDEFCC7A1F0441B5FC0CD7205D960AD8086D0
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: __fread_nolock
                                                  • String ID:
                                                  • API String ID: 2638373210-0
                                                  • Opcode ID: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                                  • Instruction ID: aada5e6a2870eb41d92d23ac636a916b9e080aa58af2ea209918d1a22be77686
                                                  • Opcode Fuzzy Hash: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                                  • Instruction Fuzzy Hash: 29E092B0504B405BD7388A24D800BB377E5BB0A304F04081DF6EA83241EB6278458759
                                                  APIs
                                                  • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,005BDD42,?,?,00000000), ref: 00585C5F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: d657ac3de90a4cb01c081a0f94a1f389f940a9741b5cf991e5d39496bb81bc4a
                                                  • Instruction ID: 77e27b3df041d68326edcd03aef773eff53add46ef163778926d157fb68befec
                                                  • Opcode Fuzzy Hash: d657ac3de90a4cb01c081a0f94a1f389f940a9741b5cf991e5d39496bb81bc4a
                                                  • Instruction Fuzzy Hash: F1D0C77464020CBFE710DB80DC46FAA777DD705710F1001D4FD0456690D6B27D508795
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: __wfsopen
                                                  • String ID:
                                                  • API String ID: 197181222-0
                                                  • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                  • Instruction ID: 135d067670b5a2c2ad4b68f74ab6b4324e6d3b6d66b7af861d79cc537035c601
                                                  • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                  • Instruction Fuzzy Hash: 8FB0927A44020C77CE012A92EC02F893F19AB82764F408020FB0C18162A673A6649A89
                                                  APIs
                                                  • GetLastError.KERNEL32(00000002,00000000), ref: 005ED1FF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast
                                                  • String ID:
                                                  • API String ID: 1452528299-0
                                                  • Opcode ID: 4b5501dd8b8bd4546317760b8397dfe016241f02d7be0e608b47c67f430e3840
                                                  • Instruction ID: 56b1a3a0ad40768bf4fd9d045d1577cffbe9c09e214a485e254a84c3b1f5a7b8
                                                  • Opcode Fuzzy Hash: 4b5501dd8b8bd4546317760b8397dfe016241f02d7be0e608b47c67f430e3840
                                                  • Instruction Fuzzy Hash: 8A717E356043428FC708EF25C495A6EBBF1BF89354F14492DF9969B3A2DB30E905CB62
                                                  APIs
                                                  • Sleep.KERNELBASE(000001F4), ref: 00F98481
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127970985.0000000000F96000.00000040.00000020.00020000.00000000.sdmp, Offset: 00F96000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_f96000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Sleep
                                                  • String ID:
                                                  • API String ID: 3472027048-0
                                                  • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                  • Instruction ID: 64bfe16e91d6aea51bab41c93be328d526f706ae486ee860bf7e6c5d11675e7b
                                                  • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                  • Instruction Fuzzy Hash: 0AE0E67498020EEFDB00EFB8D54969E7FB4EF04701F104161FD05D2280DA319D509A62
                                                  APIs
                                                    • Part of subcall function 00582612: GetWindowLongW.USER32(?,000000EB), ref: 00582623
                                                  • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0060CB37
                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0060CB95
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0060CBD6
                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0060CC00
                                                  • SendMessageW.USER32 ref: 0060CC29
                                                  • _wcsncpy.LIBCMT ref: 0060CC95
                                                  • GetKeyState.USER32(00000011), ref: 0060CCB6
                                                  • GetKeyState.USER32(00000009), ref: 0060CCC3
                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0060CCD9
                                                  • GetKeyState.USER32(00000010), ref: 0060CCE3
                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0060CD0C
                                                  • SendMessageW.USER32 ref: 0060CD33
                                                  • SendMessageW.USER32(?,00001030,?,0060B348), ref: 0060CE37
                                                  • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0060CE4D
                                                  • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0060CE60
                                                  • SetCapture.USER32(?), ref: 0060CE69
                                                  • ClientToScreen.USER32(?,?), ref: 0060CECE
                                                  • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0060CEDB
                                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0060CEF5
                                                  • ReleaseCapture.USER32 ref: 0060CF00
                                                  • GetCursorPos.USER32(?), ref: 0060CF3A
                                                  • ScreenToClient.USER32(?,?), ref: 0060CF47
                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 0060CFA3
                                                  • SendMessageW.USER32 ref: 0060CFD1
                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 0060D00E
                                                  • SendMessageW.USER32 ref: 0060D03D
                                                  • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0060D05E
                                                  • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0060D06D
                                                  • GetCursorPos.USER32(?), ref: 0060D08D
                                                  • ScreenToClient.USER32(?,?), ref: 0060D09A
                                                  • GetParent.USER32(?), ref: 0060D0BA
                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 0060D123
                                                  • SendMessageW.USER32 ref: 0060D154
                                                  • ClientToScreen.USER32(?,?), ref: 0060D1B2
                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0060D1E2
                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 0060D20C
                                                  • SendMessageW.USER32 ref: 0060D22F
                                                  • ClientToScreen.USER32(?,?), ref: 0060D281
                                                  • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0060D2B5
                                                    • Part of subcall function 005825DB: GetWindowLongW.USER32(?,000000EB), ref: 005825EC
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0060D351
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                  • String ID: @GUI_DRAGID$F$pbd
                                                  • API String ID: 3977979337-1219780232
                                                  • Opcode ID: 52eb65cfeed31492661a502c356a76b82efe75034979e0f18abf8f8a853992b6
                                                  • Instruction ID: 55af85cd6b0d1c666b17ca657b4523a90fd53a761dac2fe8b2097d1b1dee2918
                                                  • Opcode Fuzzy Hash: 52eb65cfeed31492661a502c356a76b82efe75034979e0f18abf8f8a853992b6
                                                  • Instruction Fuzzy Hash: 0942AC74244241AFDB28DF68C848AABBBE6FF49320F140629F556972F1CB71DC41DB52
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _memmove$_memset
                                                  • String ID: ]c$3cY$DEFINE$P\c$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)$_Y
                                                  • API String ID: 1357608183-3080999908
                                                  • Opcode ID: 5623a98b481c1ef7ec3b7ca550784a59afd884122a0f831e8fc1215de04c021d
                                                  • Instruction ID: c1e79e491631d14d9e5b56908234e8c5a72f622be8663958f311301cb231f032
                                                  • Opcode Fuzzy Hash: 5623a98b481c1ef7ec3b7ca550784a59afd884122a0f831e8fc1215de04c021d
                                                  • Instruction Fuzzy Hash: 4F939275A04219DBDF24CF98C881BADBBB1FF58710F24856BE945AB391E7709E81CB40
                                                  APIs
                                                  • GetForegroundWindow.USER32(00000000,?), ref: 005848DF
                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 005BD665
                                                  • IsIconic.USER32(?), ref: 005BD66E
                                                  • ShowWindow.USER32(?,00000009), ref: 005BD67B
                                                  • SetForegroundWindow.USER32(?), ref: 005BD685
                                                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 005BD69B
                                                  • GetCurrentThreadId.KERNEL32 ref: 005BD6A2
                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 005BD6AE
                                                  • AttachThreadInput.USER32(?,00000000,00000001), ref: 005BD6BF
                                                  • AttachThreadInput.USER32(?,00000000,00000001), ref: 005BD6C7
                                                  • AttachThreadInput.USER32(00000000,?,00000001), ref: 005BD6CF
                                                  • SetForegroundWindow.USER32(?), ref: 005BD6D2
                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 005BD6E7
                                                  • keybd_event.USER32(00000012,00000000), ref: 005BD6F2
                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 005BD6FC
                                                  • keybd_event.USER32(00000012,00000000), ref: 005BD701
                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 005BD70A
                                                  • keybd_event.USER32(00000012,00000000), ref: 005BD70F
                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 005BD719
                                                  • keybd_event.USER32(00000012,00000000), ref: 005BD71E
                                                  • SetForegroundWindow.USER32(?), ref: 005BD721
                                                  • AttachThreadInput.USER32(?,?,00000000), ref: 005BD748
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                  • String ID: Shell_TrayWnd
                                                  • API String ID: 4125248594-2988720461
                                                  • Opcode ID: 28a48155eeb8e07ee68c358935b660a3ce990403abbad628310733056456b2cb
                                                  • Instruction ID: 8603f4f0c5a8ee57c1bd80eb58a8d493789360e879c31a03567146e1fbe3bf1e
                                                  • Opcode Fuzzy Hash: 28a48155eeb8e07ee68c358935b660a3ce990403abbad628310733056456b2cb
                                                  • Instruction Fuzzy Hash: 55315071A80318BAEB316F619C89FBF7F6DEB44B50F104025FA04EA1D1DAB15D01ABB1
                                                  APIs
                                                    • Part of subcall function 005D87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 005D882B
                                                    • Part of subcall function 005D87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 005D8858
                                                    • Part of subcall function 005D87E1: GetLastError.KERNEL32 ref: 005D8865
                                                  • _memset.LIBCMT ref: 005D8353
                                                  • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 005D83A5
                                                  • CloseHandle.KERNEL32(?), ref: 005D83B6
                                                  • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 005D83CD
                                                  • GetProcessWindowStation.USER32 ref: 005D83E6
                                                  • SetProcessWindowStation.USER32(00000000), ref: 005D83F0
                                                  • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 005D840A
                                                    • Part of subcall function 005D81CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,005D8309), ref: 005D81E0
                                                    • Part of subcall function 005D81CB: CloseHandle.KERNEL32(?,?,005D8309), ref: 005D81F2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                  • String ID: $default$winsta0
                                                  • API String ID: 2063423040-1027155976
                                                  • Opcode ID: 6d24009911bbd1a7c42e5599414b6ac1f6e12efb5bc269c1c67a5e8927ac4da8
                                                  • Instruction ID: a997a90bd52196d44ae9cb257c725a381822c959bf3b494b70c8b8373ca6ebb6
                                                  • Opcode Fuzzy Hash: 6d24009911bbd1a7c42e5599414b6ac1f6e12efb5bc269c1c67a5e8927ac4da8
                                                  • Instruction Fuzzy Hash: 648116B1900209BFDF219FA8DC49ABEBFB9FF04304F14416BF915A6261DB319A15DB60
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(?,?), ref: 005EC78D
                                                  • FindClose.KERNEL32(00000000), ref: 005EC7E1
                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 005EC806
                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 005EC81D
                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 005EC844
                                                  • __swprintf.LIBCMT ref: 005EC890
                                                  • __swprintf.LIBCMT ref: 005EC8D3
                                                    • Part of subcall function 00587DE1: _memmove.LIBCMT ref: 00587E22
                                                  • __swprintf.LIBCMT ref: 005EC927
                                                    • Part of subcall function 005A3698: __woutput_l.LIBCMT ref: 005A36F1
                                                  • __swprintf.LIBCMT ref: 005EC975
                                                    • Part of subcall function 005A3698: __flsbuf.LIBCMT ref: 005A3713
                                                    • Part of subcall function 005A3698: __flsbuf.LIBCMT ref: 005A372B
                                                  • __swprintf.LIBCMT ref: 005EC9C4
                                                  • __swprintf.LIBCMT ref: 005ECA13
                                                  • __swprintf.LIBCMT ref: 005ECA62
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                  • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                  • API String ID: 3953360268-2428617273
                                                  • Opcode ID: a6c3642e3fa5e94350a47c50e454292908e604a90e4e30ff72eb2f1b6fa63ee8
                                                  • Instruction ID: e31ed2a7676532f196cb3f2a60cfa5aeb0a268f5cbca06a8ab098f41a40af794
                                                  • Opcode Fuzzy Hash: a6c3642e3fa5e94350a47c50e454292908e604a90e4e30ff72eb2f1b6fa63ee8
                                                  • Instruction Fuzzy Hash: 9EA11DB1408346ABC754FB94C88ADBFBBECFFD4704F440919F99596191EA30DA09CB62
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 005EEFB6
                                                  • _wcscmp.LIBCMT ref: 005EEFCB
                                                  • _wcscmp.LIBCMT ref: 005EEFE2
                                                  • GetFileAttributesW.KERNEL32(?), ref: 005EEFF4
                                                  • SetFileAttributesW.KERNEL32(?,?), ref: 005EF00E
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 005EF026
                                                  • FindClose.KERNEL32(00000000), ref: 005EF031
                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 005EF04D
                                                  • _wcscmp.LIBCMT ref: 005EF074
                                                  • _wcscmp.LIBCMT ref: 005EF08B
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 005EF09D
                                                  • SetCurrentDirectoryW.KERNEL32(00638920), ref: 005EF0BB
                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 005EF0C5
                                                  • FindClose.KERNEL32(00000000), ref: 005EF0D2
                                                  • FindClose.KERNEL32(00000000), ref: 005EF0E4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                  • String ID: *.*
                                                  • API String ID: 1803514871-438819550
                                                  • Opcode ID: 10f2b1e3244bc57c2e3c0d7614fec8e8f6f6bd7868c43c41d8fa16f356133477
                                                  • Instruction ID: ee7f04a7a44e1e3deb5a91eb44b95124667d32a25d87b3823cd6e626062eb9d5
                                                  • Opcode Fuzzy Hash: 10f2b1e3244bc57c2e3c0d7614fec8e8f6f6bd7868c43c41d8fa16f356133477
                                                  • Instruction Fuzzy Hash: C431D2325412496BCB28EFA5DC4DAEE7BAEAF49360F100175F841D3091EF71DA44CB61
                                                  APIs
                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00600953
                                                  • RegCreateKeyExW.ADVAPI32(?,?,00000000,0060F910,00000000,?,00000000,?,?), ref: 006009C1
                                                  • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00600A09
                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00600A92
                                                  • RegCloseKey.ADVAPI32(?), ref: 00600DB2
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00600DBF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Close$ConnectCreateRegistryValue
                                                  • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                  • API String ID: 536824911-966354055
                                                  • Opcode ID: f9221424c34f1d1d5cf7b5598993fbfa809908576cf214b1e4e6a1069edcd58e
                                                  • Instruction ID: b625d02963763e720f05ef704f14aed477dc2470dba9f6ebe7e4b29139625c0d
                                                  • Opcode Fuzzy Hash: f9221424c34f1d1d5cf7b5598993fbfa809908576cf214b1e4e6a1069edcd58e
                                                  • Instruction Fuzzy Hash: 93024B756046029FDB14EF18C855E6ABBE5FF89314F04845DF88AAB3A2DB30ED41CB91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0Db$0Eb$0Fb$3cY$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$pGb$_Y
                                                  • API String ID: 0-2937731933
                                                  • Opcode ID: f9bdb4d5a6671ff55976cc294cd7479679f3b64835604316f313fe0c58d6bb9c
                                                  • Instruction ID: ac47112faed2a8ac3fdde5911493325521272dcfa0b84b62cf15cabce2f3e6d3
                                                  • Opcode Fuzzy Hash: f9bdb4d5a6671ff55976cc294cd7479679f3b64835604316f313fe0c58d6bb9c
                                                  • Instruction Fuzzy Hash: 7C725C75E006199BDF24CF59D8807AEBBB5FF44310F14856BE809EB380EB749A85CB94
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 005EF113
                                                  • _wcscmp.LIBCMT ref: 005EF128
                                                  • _wcscmp.LIBCMT ref: 005EF13F
                                                    • Part of subcall function 005E4385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 005E43A0
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 005EF16E
                                                  • FindClose.KERNEL32(00000000), ref: 005EF179
                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 005EF195
                                                  • _wcscmp.LIBCMT ref: 005EF1BC
                                                  • _wcscmp.LIBCMT ref: 005EF1D3
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 005EF1E5
                                                  • SetCurrentDirectoryW.KERNEL32(00638920), ref: 005EF203
                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 005EF20D
                                                  • FindClose.KERNEL32(00000000), ref: 005EF21A
                                                  • FindClose.KERNEL32(00000000), ref: 005EF22C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                  • String ID: *.*
                                                  • API String ID: 1824444939-438819550
                                                  • Opcode ID: 7b73b2bf520e034cd14d680e214548fb8429f6045858136b923a2f0f395880ae
                                                  • Instruction ID: a81a103aee3007c856110fc40b4313bc13a5f9b11abc2cd63ce3ca95899955b1
                                                  • Opcode Fuzzy Hash: 7b73b2bf520e034cd14d680e214548fb8429f6045858136b923a2f0f395880ae
                                                  • Instruction Fuzzy Hash: 4B31D73654025E6ADB28AFA5EC49AEE7B6DAF49360F110171F944A30D0DF30DE45CB54
                                                  APIs
                                                  • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 005EA20F
                                                  • __swprintf.LIBCMT ref: 005EA231
                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 005EA26E
                                                  • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 005EA293
                                                  • _memset.LIBCMT ref: 005EA2B2
                                                  • _wcsncpy.LIBCMT ref: 005EA2EE
                                                  • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 005EA323
                                                  • CloseHandle.KERNEL32(00000000), ref: 005EA32E
                                                  • RemoveDirectoryW.KERNEL32(?), ref: 005EA337
                                                  • CloseHandle.KERNEL32(00000000), ref: 005EA341
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                  • String ID: :$\$\??\%s
                                                  • API String ID: 2733774712-3457252023
                                                  • Opcode ID: 9c2ddf3b1cb1386432f5e860618cb931fd83e34576f90893b43a89685c80d4bd
                                                  • Instruction ID: 50a24793671c5409d045bef244e6154df9eb8bf207392f3ec4d6e3e7f8229dba
                                                  • Opcode Fuzzy Hash: 9c2ddf3b1cb1386432f5e860618cb931fd83e34576f90893b43a89685c80d4bd
                                                  • Instruction Fuzzy Hash: E631A07550024AABDB20DFA1DC49FEF3BBDBF89700F1040B6F609D6160E770A6448B65
                                                  APIs
                                                  • GetKeyboardState.USER32(?), ref: 005E0097
                                                  • SetKeyboardState.USER32(?), ref: 005E0102
                                                  • GetAsyncKeyState.USER32(000000A0), ref: 005E0122
                                                  • GetKeyState.USER32(000000A0), ref: 005E0139
                                                  • GetAsyncKeyState.USER32(000000A1), ref: 005E0168
                                                  • GetKeyState.USER32(000000A1), ref: 005E0179
                                                  • GetAsyncKeyState.USER32(00000011), ref: 005E01A5
                                                  • GetKeyState.USER32(00000011), ref: 005E01B3
                                                  • GetAsyncKeyState.USER32(00000012), ref: 005E01DC
                                                  • GetKeyState.USER32(00000012), ref: 005E01EA
                                                  • GetAsyncKeyState.USER32(0000005B), ref: 005E0213
                                                  • GetKeyState.USER32(0000005B), ref: 005E0221
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: State$Async$Keyboard
                                                  • String ID:
                                                  • API String ID: 541375521-0
                                                  • Opcode ID: c874249cd51d347dd2c21c0f67f9448a7f765c46cfc1b49e724d4f0a06e3aaab
                                                  • Instruction ID: e040721eb4992b4e094b610eb78782cc21dd9446e71b6a2c5d8c24426540a930
                                                  • Opcode Fuzzy Hash: c874249cd51d347dd2c21c0f67f9448a7f765c46cfc1b49e724d4f0a06e3aaab
                                                  • Instruction Fuzzy Hash: 8A51F9249047C929FB3DDBA188187EABFB4AF01380F48559AC5C65A5C2DAE49BCCC761
                                                  APIs
                                                    • Part of subcall function 00600E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,005FFDAD,?,?), ref: 00600E31
                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006004AC
                                                    • Part of subcall function 00589837: __itow.LIBCMT ref: 00589862
                                                    • Part of subcall function 00589837: __swprintf.LIBCMT ref: 005898AC
                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0060054B
                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 006005E3
                                                  • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00600822
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 0060082F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                  • String ID:
                                                  • API String ID: 1240663315-0
                                                  • Opcode ID: 878e4b15b9c128423e85b909f3d3ab5d91ef8eded1e89980f8b560f2d1539cb2
                                                  • Instruction ID: 8b4f244e6c62e76b8fc8073cb580b51da83df53810c1d44ead92ed5d307b98e3
                                                  • Opcode Fuzzy Hash: 878e4b15b9c128423e85b909f3d3ab5d91ef8eded1e89980f8b560f2d1539cb2
                                                  • Instruction Fuzzy Hash: 28E14D71204205AFDB14DF28C895E6BBBE9FF89314F04856DF84ADB2A1DA31ED05CB91
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                  • String ID:
                                                  • API String ID: 1737998785-0
                                                  • Opcode ID: 8386713b2c7371580db86666558949b5c6464ece72c57c8c4fe0c2c430d75361
                                                  • Instruction ID: 4114751de7c3e0446902d4c90c27d08765fba081431c82ffa111a8956db902dc
                                                  • Opcode Fuzzy Hash: 8386713b2c7371580db86666558949b5c6464ece72c57c8c4fe0c2c430d75361
                                                  • Instruction Fuzzy Hash: B72188352402159FDB20AF64EC09B7A7BA9FB45310F14802AFA469B2A2DB34A901CF84
                                                  APIs
                                                    • Part of subcall function 00584750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00584743,?,?,005837AE,?), ref: 00584770
                                                    • Part of subcall function 005E4A31: GetFileAttributesW.KERNEL32(?,005E370B), ref: 005E4A32
                                                  • FindFirstFileW.KERNEL32(?,?), ref: 005E38A3
                                                  • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 005E394B
                                                  • MoveFileW.KERNEL32(?,?), ref: 005E395E
                                                  • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 005E397B
                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 005E399D
                                                  • FindClose.KERNEL32(00000000,?,?,?,?), ref: 005E39B9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                  • String ID: \*.*
                                                  • API String ID: 4002782344-1173974218
                                                  • Opcode ID: f491f8ea43bc4f8fc7eb7d4fe168966d5b78a32b857f333dcfb46249d2a50f87
                                                  • Instruction ID: 4b7635ffe24947209e89dc48386022d52cd80d7c0e6fc9e12587004327ec8adc
                                                  • Opcode Fuzzy Hash: f491f8ea43bc4f8fc7eb7d4fe168966d5b78a32b857f333dcfb46249d2a50f87
                                                  • Instruction Fuzzy Hash: 5B51613180518E9ACF19FFA1D99A9EDBF79BF54310F600069F845B7192EB216F09CB50
                                                  APIs
                                                    • Part of subcall function 00587DE1: _memmove.LIBCMT ref: 00587E22
                                                  • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 005EF440
                                                  • Sleep.KERNEL32(0000000A), ref: 005EF470
                                                  • _wcscmp.LIBCMT ref: 005EF484
                                                  • _wcscmp.LIBCMT ref: 005EF49F
                                                  • FindNextFileW.KERNEL32(?,?), ref: 005EF53D
                                                  • FindClose.KERNEL32(00000000), ref: 005EF553
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                  • String ID: *.*
                                                  • API String ID: 713712311-438819550
                                                  • Opcode ID: b98d530870a627ad01b3ff104867f61a76e15b2839504410cb54080b5ba2f570
                                                  • Instruction ID: cf21c46be0a9d51d4d7f650d549fe27f378231fb0d93668f382933ea951cfbe4
                                                  • Opcode Fuzzy Hash: b98d530870a627ad01b3ff104867f61a76e15b2839504410cb54080b5ba2f570
                                                  • Instruction Fuzzy Hash: 68418C7190024AAFCF18EF68DC49AEEBFB4FF59314F104466E855A3191EB309E44CB90
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: __itow__swprintf
                                                  • String ID: 3cY$_Y
                                                  • API String ID: 674341424-2284220399
                                                  • Opcode ID: 95ec31e27defac915a3d06bc3763de2471f248800e8257815fe367686b00809c
                                                  • Instruction ID: b45a0f18487db562c75c061a21637c760b7c48f281929a5a79746569252e2463
                                                  • Opcode Fuzzy Hash: 95ec31e27defac915a3d06bc3763de2471f248800e8257815fe367686b00809c
                                                  • Instruction Fuzzy Hash: 642268716083029FCB24EF54C885B6EBBE4BFC5314F14492DF99A97291DB71EA04CB92
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _memmove
                                                  • String ID:
                                                  • API String ID: 4104443479-0
                                                  • Opcode ID: ac145aa73aa5815e72d1ff19bf9397236e5e3a6aa1e0725fed4dd4c547ad87b6
                                                  • Instruction ID: e6c20e1bab573586f468fbdd9d82108394a7fe8a8746c10902cd100a6fddcdfc
                                                  • Opcode Fuzzy Hash: ac145aa73aa5815e72d1ff19bf9397236e5e3a6aa1e0725fed4dd4c547ad87b6
                                                  • Instruction Fuzzy Hash: 6F129270A0060ADFDF14DFA5D945AAEBBF5FF88300F10552AE806E7291EB35AD25CB50
                                                  APIs
                                                    • Part of subcall function 00584750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00584743,?,?,005837AE,?), ref: 00584770
                                                    • Part of subcall function 005E4A31: GetFileAttributesW.KERNEL32(?,005E370B), ref: 005E4A32
                                                  • FindFirstFileW.KERNEL32(?,?), ref: 005E3B89
                                                  • DeleteFileW.KERNEL32(?,?,?,?), ref: 005E3BD9
                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 005E3BEA
                                                  • FindClose.KERNEL32(00000000), ref: 005E3C01
                                                  • FindClose.KERNEL32(00000000), ref: 005E3C0A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                  • String ID: \*.*
                                                  • API String ID: 2649000838-1173974218
                                                  • Opcode ID: bdae2fb260f80198c601366766dbe81f2dddb021c0332697df08603e3df08f0f
                                                  • Instruction ID: 37de47e1c4549ca70a6c0c7fe0f8d53392546c09141d127b137d56bb03a3bb77
                                                  • Opcode Fuzzy Hash: bdae2fb260f80198c601366766dbe81f2dddb021c0332697df08603e3df08f0f
                                                  • Instruction Fuzzy Hash: 49316F310083869BC305FF64D8998AFBFA9BE95314F444D2DF8D5A3191EB21DA09CB97
                                                  APIs
                                                    • Part of subcall function 005D87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 005D882B
                                                    • Part of subcall function 005D87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 005D8858
                                                    • Part of subcall function 005D87E1: GetLastError.KERNEL32 ref: 005D8865
                                                  • ExitWindowsEx.USER32(?,00000000), ref: 005E51F9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                  • String ID: $@$SeShutdownPrivilege
                                                  • API String ID: 2234035333-194228
                                                  • Opcode ID: dc102536f477d360167a702d372824f88b90e29e47303890e3b8868cf29f63c0
                                                  • Instruction ID: e55b20a21bfb2a126eb25073af1e9f8014b3efe6565956e9700bb5df61c80550
                                                  • Opcode Fuzzy Hash: dc102536f477d360167a702d372824f88b90e29e47303890e3b8868cf29f63c0
                                                  • Instruction Fuzzy Hash: 6A01F7396916526BE73C676AAC9AFBB7A98FB05348F600821FBC3E21D2F9511C008590
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: BuffCharUpper
                                                  • String ID: pbd$%a
                                                  • API String ID: 3964851224-2549464515
                                                  • Opcode ID: 9e251c03f409a1a5676bb6a3599cdca56b1f554b9990fdc14970446a2cb5cf53
                                                  • Instruction ID: db81013acbefda8a0a6913b6cd11efa87d5688de8cbcf9320449aa176d0c5e16
                                                  • Opcode Fuzzy Hash: 9e251c03f409a1a5676bb6a3599cdca56b1f554b9990fdc14970446a2cb5cf53
                                                  • Instruction Fuzzy Hash: 9F927A706083419FDB20DF14C494B2ABBE5FF89304F14996DE98A9B3A2D771EC45CB92
                                                  APIs
                                                  • socket.WSOCK32(00000002,00000001,00000006), ref: 005F62DC
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 005F62EB
                                                  • bind.WSOCK32(00000000,?,00000010), ref: 005F6307
                                                  • listen.WSOCK32(00000000,00000005), ref: 005F6316
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 005F6330
                                                  • closesocket.WSOCK32(00000000), ref: 005F6344
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$bindclosesocketlistensocket
                                                  • String ID:
                                                  • API String ID: 1279440585-0
                                                  • Opcode ID: d396007377ac6ade2dc73c7e0ef7600308ced3b3e2afc64f2e42c902cdd04d8c
                                                  • Instruction ID: 868364c073d164d216eec19d9e787b70701d2147190b1f725ca9c80614f66788
                                                  • Opcode Fuzzy Hash: d396007377ac6ade2dc73c7e0ef7600308ced3b3e2afc64f2e42c902cdd04d8c
                                                  • Instruction Fuzzy Hash: 5721CE346002099FCB10EF68D849A7EBBB9FF88320F148559EA16A73D1CB74AC05CB51
                                                  APIs
                                                    • Part of subcall function 005A0DB6: std::exception::exception.LIBCMT ref: 005A0DEC
                                                    • Part of subcall function 005A0DB6: __CxxThrowException@8.LIBCMT ref: 005A0E01
                                                  • _memmove.LIBCMT ref: 005D0258
                                                  • _memmove.LIBCMT ref: 005D036D
                                                  • _memmove.LIBCMT ref: 005D0414
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                  • String ID:
                                                  • API String ID: 1300846289-0
                                                  • Opcode ID: bf1be098beb6f6d00417ccefa0408e335b4f478e2123eaa4534640c19c2a2801
                                                  • Instruction ID: 2f85ccefd9039bc78242668669732f28d7e224136e4eb343aa8c3fab9923e81c
                                                  • Opcode Fuzzy Hash: bf1be098beb6f6d00417ccefa0408e335b4f478e2123eaa4534640c19c2a2801
                                                  • Instruction Fuzzy Hash: E102A170A0020ADBCF15DF68D985AAE7FB5FF84300F54846AE806EB395EB35D950CB91
                                                  APIs
                                                    • Part of subcall function 00582612: GetWindowLongW.USER32(?,000000EB), ref: 00582623
                                                  • DefDlgProcW.USER32(?,?,?,?,?), ref: 005819FA
                                                  • GetSysColor.USER32(0000000F), ref: 00581A4E
                                                  • SetBkColor.GDI32(?,00000000), ref: 00581A61
                                                    • Part of subcall function 00581290: DefDlgProcW.USER32(?,00000020,?), ref: 005812D8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ColorProc$LongWindow
                                                  • String ID:
                                                  • API String ID: 3744519093-0
                                                  • Opcode ID: 8877cf20e1e55ffea1c951c2387adb1c5f329f9d9ad0e8ea691214703d50623b
                                                  • Instruction ID: f901660cb2d586e4a1447cd370f8cf8ba256a2037a0a77879eeb70ef8a4f8a8e
                                                  • Opcode Fuzzy Hash: 8877cf20e1e55ffea1c951c2387adb1c5f329f9d9ad0e8ea691214703d50623b
                                                  • Instruction Fuzzy Hash: FEA10871102D55FAE72CBB39CC48DBB2E5EFB42351B14061AFD02F6192DA949D0293BD
                                                  APIs
                                                    • Part of subcall function 005F7D8B: inet_addr.WSOCK32(00000000), ref: 005F7DB6
                                                  • socket.WSOCK32(00000002,00000002,00000011), ref: 005F679E
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 005F67C7
                                                  • bind.WSOCK32(00000000,?,00000010), ref: 005F6800
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 005F680D
                                                  • closesocket.WSOCK32(00000000), ref: 005F6821
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                  • String ID:
                                                  • API String ID: 99427753-0
                                                  • Opcode ID: 86d8d8d117ff5a9edbf29f2f10e6ab39d84ac18694e0f753ae7e3d03dc0bf5df
                                                  • Instruction ID: 39b992293eb8367196758128ae6494be3f030bbe397ca99dfce20e69d3ac5993
                                                  • Opcode Fuzzy Hash: 86d8d8d117ff5a9edbf29f2f10e6ab39d84ac18694e0f753ae7e3d03dc0bf5df
                                                  • Instruction Fuzzy Hash: C241B475640205AFDB50BF248C8AF7E7BA9FB85714F448458FE16AB3C2CA749D018B91
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                  • String ID:
                                                  • API String ID: 292994002-0
                                                  • Opcode ID: aceb2cdfde5da6fff73ca9d1de51ac9a3e01506d233ffdf1895e7dcfd3998aea
                                                  • Instruction ID: 9d69753849887b26dd5f481b2fa6866905d342cc3dac1787261a10963f5c7001
                                                  • Opcode Fuzzy Hash: aceb2cdfde5da6fff73ca9d1de51ac9a3e01506d233ffdf1895e7dcfd3998aea
                                                  • Instruction Fuzzy Hash: 9411B6313809115BEB396F269C48AAB7B9AFF847A1B444029F847D3281DBB09C018FA4
                                                  APIs
                                                  • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 005D80C0
                                                  • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 005D80CA
                                                  • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 005D80D9
                                                  • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 005D80E0
                                                  • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 005D80F6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                  • String ID:
                                                  • API String ID: 44706859-0
                                                  • Opcode ID: f134b2c13b66eb96a5847d207dccd5e4bbf622c0ebef4c1e5495d4da2ae97d9e
                                                  • Instruction ID: 9bf8313ea852c3fdf4e902f0079d601eaf47855280f966308bb11ddb9b7b2fa6
                                                  • Opcode Fuzzy Hash: f134b2c13b66eb96a5847d207dccd5e4bbf622c0ebef4c1e5495d4da2ae97d9e
                                                  • Instruction Fuzzy Hash: ABF06231280304AFEB304FA9EC8DE773FADFF49B55B000026F945C6250CB619C85DA60
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Ddd$Ddd$Ddd$Ddd$Variable must be of type 'Object'.
                                                  • API String ID: 0-2865629308
                                                  • Opcode ID: 17d7f5c04a8702f60576949e25e01c561185d9b14d14490df75d84aa44a100dd
                                                  • Instruction ID: 16f3feaf9061d96b67ceecaae6581bac17bde615607b3a0259195992aaac1e99
                                                  • Opcode Fuzzy Hash: 17d7f5c04a8702f60576949e25e01c561185d9b14d14490df75d84aa44a100dd
                                                  • Instruction Fuzzy Hash: E6A29D74A00219CFCB24EF94C486AAEBBB6FF59314F248459ED06AB351D770ED42CB91
                                                  APIs
                                                  • CoInitialize.OLE32(00000000), ref: 005EC432
                                                  • CoCreateInstance.OLE32(00612D6C,00000000,00000001,00612BDC,?), ref: 005EC44A
                                                    • Part of subcall function 00587DE1: _memmove.LIBCMT ref: 00587E22
                                                  • CoUninitialize.OLE32 ref: 005EC6B7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CreateInitializeInstanceUninitialize_memmove
                                                  • String ID: .lnk
                                                  • API String ID: 2683427295-24824748
                                                  • Opcode ID: 75d1b663e25e663bb88e60b9ae9a496357fc1814bda03002fd2598967b4e76ed
                                                  • Instruction ID: 33469d969f416e9724fae975ab6339c6d1ce229a551dbe05287609b40cb545c6
                                                  • Opcode Fuzzy Hash: 75d1b663e25e663bb88e60b9ae9a496357fc1814bda03002fd2598967b4e76ed
                                                  • Instruction Fuzzy Hash: B2A13A71104206AFD700EF54C885EABBBECFFC8358F044919F596A7192EB71E949CB92
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00584AD0), ref: 00584B45
                                                  • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00584B57
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: GetNativeSystemInfo$kernel32.dll
                                                  • API String ID: 2574300362-192647395
                                                  • Opcode ID: 4e3fbbc3d35353b04e8a133b58d14d382b5cd4426f4c8e4d455580f0bc984ba2
                                                  • Instruction ID: 3e0ee857ea9bf3fd643245cf46cc95a75951b9b97b82cfea5c617242c1681aff
                                                  • Opcode Fuzzy Hash: 4e3fbbc3d35353b04e8a133b58d14d382b5cd4426f4c8e4d455580f0bc984ba2
                                                  • Instruction Fuzzy Hash: 36D01234A50713CFDB30AF31D818B0776D5BF05351B11887998C5D6990E770D480CF54
                                                  APIs
                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 005FEE3D
                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 005FEE4B
                                                    • Part of subcall function 00587DE1: _memmove.LIBCMT ref: 00587E22
                                                  • Process32NextW.KERNEL32(00000000,?), ref: 005FEF0B
                                                  • CloseHandle.KERNEL32(00000000,?,?,?), ref: 005FEF1A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                  • String ID:
                                                  • API String ID: 2576544623-0
                                                  • Opcode ID: d40c6c0afe529da6fa610852ebe5d536e0f9b9710e015bb5cf33e97e826129a5
                                                  • Instruction ID: be8af72366c8b240e4a43f265c4524d2f23bab91cdaae6d2adfc6cb4b5af3f59
                                                  • Opcode Fuzzy Hash: d40c6c0afe529da6fa610852ebe5d536e0f9b9710e015bb5cf33e97e826129a5
                                                  • Instruction Fuzzy Hash: 3F5151715043169FD310EF24DC86E6BBBE8FF94710F54482DF995A62A1EB70E904CB92
                                                  APIs
                                                  • lstrlenW.KERNEL32(?,?,?,00000000), ref: 005DE628
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: lstrlen
                                                  • String ID: ($|
                                                  • API String ID: 1659193697-1631851259
                                                  • Opcode ID: 65e283b8f76e4bd9b80e7eb3f08f4b6586a40ae6a1f9be3a971770b667bab144
                                                  • Instruction ID: c39afc0a3875a20ad7a6391e0ae1512dba5786c3d604c8b8d91d65cdbaf89e1d
                                                  • Opcode Fuzzy Hash: 65e283b8f76e4bd9b80e7eb3f08f4b6586a40ae6a1f9be3a971770b667bab144
                                                  • Instruction Fuzzy Hash: 43321275A006059FDB28DF19D4819AABBF1FF48320B15C46FE89ADB3A1E770E941CB40
                                                  APIs
                                                  • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,005F180A,00000000), ref: 005F23E1
                                                  • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 005F2418
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Internet$AvailableDataFileQueryRead
                                                  • String ID:
                                                  • API String ID: 599397726-0
                                                  • Opcode ID: e33e35caef42a4ef1a765e782ce689f388f439ae63c09db9549625cfc431e3c3
                                                  • Instruction ID: 1db0395b3e2223e22cc89962060807b03c8e79ace130d20ab2e95e633ff5c8c0
                                                  • Opcode Fuzzy Hash: e33e35caef42a4ef1a765e782ce689f388f439ae63c09db9549625cfc431e3c3
                                                  • Instruction Fuzzy Hash: BC41A3F150420DBFEF20DE95DC89EBBBBADFB80314F10446AF701A6180EAB99E419650
                                                  APIs
                                                  • SetErrorMode.KERNEL32(00000001), ref: 005EB343
                                                  • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 005EB39D
                                                  • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 005EB3EA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ErrorMode$DiskFreeSpace
                                                  • String ID:
                                                  • API String ID: 1682464887-0
                                                  • Opcode ID: 66e96c69d1f13340b3d1a20f6e503ce58b9cc35bc2d7a27a2ee8e2611e784337
                                                  • Instruction ID: 23929b24ec78db3d700f803c3e74013b9aa0457ec7fa5ee66b5f984cdd2ce0d0
                                                  • Opcode Fuzzy Hash: 66e96c69d1f13340b3d1a20f6e503ce58b9cc35bc2d7a27a2ee8e2611e784337
                                                  • Instruction Fuzzy Hash: 5C217135A00109EFCB00EFA5D885AEEBFB9FF89314F1480AAE945AB351DB319915CF51
                                                  APIs
                                                    • Part of subcall function 005A0DB6: std::exception::exception.LIBCMT ref: 005A0DEC
                                                    • Part of subcall function 005A0DB6: __CxxThrowException@8.LIBCMT ref: 005A0E01
                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 005D882B
                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 005D8858
                                                  • GetLastError.KERNEL32 ref: 005D8865
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                  • String ID:
                                                  • API String ID: 1922334811-0
                                                  • Opcode ID: a8fe767b1c985b067c4d1134fe20e2338474c55e97a98d062edcbd849cef7670
                                                  • Instruction ID: 3f0be111fded88f78952e4e84b2bbf473528f0ddba6816f961ecf5740de942ba
                                                  • Opcode Fuzzy Hash: a8fe767b1c985b067c4d1134fe20e2338474c55e97a98d062edcbd849cef7670
                                                  • Instruction Fuzzy Hash: 541160B2414205AFE728EF58DC85D6BBBADFB45710B10852EE45697741DA30BC408B60
                                                  APIs
                                                  • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 005D8774
                                                  • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 005D878B
                                                  • FreeSid.ADVAPI32(?), ref: 005D879B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: AllocateCheckFreeInitializeMembershipToken
                                                  • String ID:
                                                  • API String ID: 3429775523-0
                                                  • Opcode ID: 198f5f0d991e9b9b135bdef17930eb67f254fe0ceae8d8c67543b2005efdac9d
                                                  • Instruction ID: 381d94e2913d0f86e52dba2d46468727079dcab0b7e50c623f510c47b5b0dbb8
                                                  • Opcode Fuzzy Hash: 198f5f0d991e9b9b135bdef17930eb67f254fe0ceae8d8c67543b2005efdac9d
                                                  • Instruction Fuzzy Hash: 94F04975A5130CBFDF10DFF4DC99ABEBBBDEF08601F1044A9A902E2681E6716A448B50
                                                  APIs
                                                  • __time64.LIBCMT ref: 005E889B
                                                    • Part of subcall function 005A520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,005E8F6E,00000000,?,?,?,?,005E911F,00000000,?), ref: 005A5213
                                                    • Part of subcall function 005A520A: __aulldiv.LIBCMT ref: 005A5233
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Time$FileSystem__aulldiv__time64
                                                  • String ID: 0ed
                                                  • API String ID: 2893107130-2306803233
                                                  • Opcode ID: 4b6e00d30329207da091942aacd2e69749a77bca54229c2ccfed6e92dab62b76
                                                  • Instruction ID: b22891245b61a21d7e8b274d2409104a56620bbc29fb1c83ecf5ec3efef93c95
                                                  • Opcode Fuzzy Hash: 4b6e00d30329207da091942aacd2e69749a77bca54229c2ccfed6e92dab62b76
                                                  • Instruction Fuzzy Hash: 1021B436635510CBC72DCF25D841A62B7E2EFA6311B688E6CE5F9CB2C0CA34B945CB54
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(?,?), ref: 005EC6FB
                                                  • FindClose.KERNEL32(00000000), ref: 005EC72B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFileFirst
                                                  • String ID:
                                                  • API String ID: 2295610775-0
                                                  • Opcode ID: e54563b2a0c2dd9b01e57a5fdfe1e83684fa743f67874f655844664e811d2ebb
                                                  • Instruction ID: 8913382a447741da1368564ff26a352ecbaf2810902611f0fd093cf17af80f88
                                                  • Opcode Fuzzy Hash: e54563b2a0c2dd9b01e57a5fdfe1e83684fa743f67874f655844664e811d2ebb
                                                  • Instruction Fuzzy Hash: 301182716002019FDB14EF29D84992AFBE5FF85324F04851EF9A697291DB30EC05CF81
                                                  APIs
                                                  • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,005F9468,?,0060FB84,?), ref: 005EA097
                                                  • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,005F9468,?,0060FB84,?), ref: 005EA0A9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ErrorFormatLastMessage
                                                  • String ID:
                                                  • API String ID: 3479602957-0
                                                  • Opcode ID: 3dc45ddb29425888882ebaf8c1e6907afc2a45f05bb3a9ce7bcdfbdc4ba58044
                                                  • Instruction ID: bf5130487d76de2a2e7a860a62c41e51e55ca19929b2df42898595ca0f3c720a
                                                  • Opcode Fuzzy Hash: 3dc45ddb29425888882ebaf8c1e6907afc2a45f05bb3a9ce7bcdfbdc4ba58044
                                                  • Instruction Fuzzy Hash: F6F0823554622DABDB61AFA4CC4CFEA7B6DBF08361F004165F949D6181D670AA40CBA1
                                                  APIs
                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,005D8309), ref: 005D81E0
                                                  • CloseHandle.KERNEL32(?,?,005D8309), ref: 005D81F2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: AdjustCloseHandlePrivilegesToken
                                                  • String ID:
                                                  • API String ID: 81990902-0
                                                  • Opcode ID: cf783d58bc86f956139ba4f4d1dd4be8361a0898ae189ba451ff144c09cceb1b
                                                  • Instruction ID: 40215329047ecd5b5d6210bd3eca642bc286a9e09fc4a05d447da8ce102268e2
                                                  • Opcode Fuzzy Hash: cf783d58bc86f956139ba4f4d1dd4be8361a0898ae189ba451ff144c09cceb1b
                                                  • Instruction Fuzzy Hash: 9AE0E671010611AFEB352B64EC09D777BEEFF44310714982DF45684470DB615C91DB50
                                                  APIs
                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,005A8D57,?,?,?,00000001), ref: 005AA15A
                                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 005AA163
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled
                                                  • String ID:
                                                  • API String ID: 3192549508-0
                                                  • Opcode ID: 78d3a800b4b2b904554d9793cbc7f3177d9c12182f442bce423e99436926e98e
                                                  • Instruction ID: df8c448ed63c9dbd55d204e309d7347267f905cfb9aba45d31ce868458728936
                                                  • Opcode Fuzzy Hash: 78d3a800b4b2b904554d9793cbc7f3177d9c12182f442bce423e99436926e98e
                                                  • Instruction Fuzzy Hash: 53B09231098208ABCB142B91EC09B8A3F6AEB45AB2F406020F60D84860CF6254508AD1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 24f7e8b0add034c6129538ea5f46d89858c692194800dcac52d03b3e7879bc68
                                                  • Instruction ID: 384ad2289c0979ddde9cac6a9c474ebb16cfd5767a263bdb172eba3ddd9edebb
                                                  • Opcode Fuzzy Hash: 24f7e8b0add034c6129538ea5f46d89858c692194800dcac52d03b3e7879bc68
                                                  • Instruction Fuzzy Hash: F7320621D69F414DD7239A34D83233AA659BFB73D4F15D737F81AB59A6EB28C4834200
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 83d6acbafcdad0512c691af3935182d5158abf71171146fd1fd0f942b87836a8
                                                  • Instruction ID: e2c9abbc21ba6f43cc1b17ec3cdf4adb1bc7e6c0469b91435590dd3bcf4658a1
                                                  • Opcode Fuzzy Hash: 83d6acbafcdad0512c691af3935182d5158abf71171146fd1fd0f942b87836a8
                                                  • Instruction Fuzzy Hash: 37B1F030E2AF414DD32396798831336BA9DAFBB2D5F55E71BFC2A74D22EB2185834141
                                                  APIs
                                                  • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 005E4C76
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: mouse_event
                                                  • String ID:
                                                  • API String ID: 2434400541-0
                                                  • Opcode ID: 56f3571293429696ff2d06c7a2e85604b2b568c01712c1d15011e5903078b645
                                                  • Instruction ID: bde909935b3e7a5e1c4e0467d7d377a32c516f523baace2375dc2787d7d071bc
                                                  • Opcode Fuzzy Hash: 56f3571293429696ff2d06c7a2e85604b2b568c01712c1d15011e5903078b645
                                                  • Instruction Fuzzy Hash: 28D05EA016228938EF2C07228D4FF7A1909F3C0F81FA595CA72C9C70C0E8D05C00A834
                                                  APIs
                                                  • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,005D8389), ref: 005D87D1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: LogonUser
                                                  • String ID:
                                                  • API String ID: 1244722697-0
                                                  • Opcode ID: ceee1dd046588535e9fc9583e1493ede2a1e99a59b5c664affde6ac5bdc069d2
                                                  • Instruction ID: 6140dfc03ef617dd1674a9c173ba3c26dfadf257aa4b70ae29d35a77972682d0
                                                  • Opcode Fuzzy Hash: ceee1dd046588535e9fc9583e1493ede2a1e99a59b5c664affde6ac5bdc069d2
                                                  • Instruction Fuzzy Hash: 63D05E322A050EABEF018FA4DC01EAF3B6AEB04B01F408111FE16C50A1C775D835AB60
                                                  APIs
                                                  • SetUnhandledExceptionFilter.KERNEL32(?), ref: 005AA12A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled
                                                  • String ID:
                                                  • API String ID: 3192549508-0
                                                  • Opcode ID: e36624f0b0ed8dd393ee163498c14c4f6c8b1e33e7a72af29b07570397f56931
                                                  • Instruction ID: 6b21b2ca911a52155ce86f6494b8e95cf97cdfffda4a95d38faecf27379ce0d9
                                                  • Opcode Fuzzy Hash: e36624f0b0ed8dd393ee163498c14c4f6c8b1e33e7a72af29b07570397f56931
                                                  • Instruction Fuzzy Hash: B3A0123004410CA7CB001B41EC044457F5DD6001A07005020F40C404218F32541045C0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ccf4ae06ddb8289e88d661c39c9215398c6a3acbfb92cd076978a89026da5969
                                                  • Instruction ID: 9ac1bed78d14f7983b63c5298d3329746ca1eafb6db6071e94d7392639b497f7
                                                  • Opcode Fuzzy Hash: ccf4ae06ddb8289e88d661c39c9215398c6a3acbfb92cd076978a89026da5969
                                                  • Instruction Fuzzy Hash: C9221330A04506CBDF388A68C49477CBFA1FF42354F38886BD9968B692EB70DD91CA41
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                  • Instruction ID: 548443703cbca80b0684de924417bd1558c7695e3e901be638cf98e6ea5e71c0
                                                  • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                  • Instruction Fuzzy Hash: 37C183362055A30ADF2D463E843513EBEA17FA37B1B1A076DD8B3DB1D4EE20C925D620
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                  • Instruction ID: 36acbdaa0572f1309fd0121bf561ca615cc78ef2d400f77a56ebf7706006ae6e
                                                  • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                  • Instruction Fuzzy Hash: 05C170322055A30ADF2D463E843513EBEA17FA37B1B1A076DE4B3DB1D5EE20C965D620
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                  • Instruction ID: 825d6aded47f26bc75495a82d6271e9ca7e6d643cba0b767aae26d5a5a8c2e2d
                                                  • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                  • Instruction Fuzzy Hash: A3C170322099A309DF2D463A847413EBFA17FA37B1B1A176DD4B3DB1C4EE20C925D664
                                                  APIs
                                                  • DeleteObject.GDI32(00000000), ref: 005F785B
                                                  • DeleteObject.GDI32(00000000), ref: 005F786D
                                                  • DestroyWindow.USER32 ref: 005F787B
                                                  • GetDesktopWindow.USER32 ref: 005F7895
                                                  • GetWindowRect.USER32(00000000), ref: 005F789C
                                                  • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 005F79DD
                                                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 005F79ED
                                                  • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 005F7A35
                                                  • GetClientRect.USER32(00000000,?), ref: 005F7A41
                                                  • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 005F7A7B
                                                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 005F7A9D
                                                  • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 005F7AB0
                                                  • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 005F7ABB
                                                  • GlobalLock.KERNEL32(00000000), ref: 005F7AC4
                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 005F7AD3
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 005F7ADC
                                                  • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 005F7AE3
                                                  • GlobalFree.KERNEL32(00000000), ref: 005F7AEE
                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 005F7B00
                                                  • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00612CAC,00000000), ref: 005F7B16
                                                  • GlobalFree.KERNEL32(00000000), ref: 005F7B26
                                                  • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 005F7B4C
                                                  • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 005F7B6B
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 005F7B8D
                                                  • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 005F7D7A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                  • String ID: $AutoIt v3$DISPLAY$static
                                                  • API String ID: 2211948467-2373415609
                                                  • Opcode ID: 3c42a16a4d2ae6ba79ffe1f1157d47a6ef755267b1c766f7649332c47a48a073
                                                  • Instruction ID: 09d7a31669eae970ec568cad54c8bab517b3dad5e875dae56b33b34328126e48
                                                  • Opcode Fuzzy Hash: 3c42a16a4d2ae6ba79ffe1f1157d47a6ef755267b1c766f7649332c47a48a073
                                                  • Instruction Fuzzy Hash: FA025A71900119EFDB14DFA4DD89EAF7BBAFB49310F148169F905AB2A1CB74AD01CB60
                                                  APIs
                                                  • CharUpperBuffW.USER32(?,?,0060F910), ref: 00603627
                                                  • IsWindowVisible.USER32(?), ref: 0060364B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: BuffCharUpperVisibleWindow
                                                  • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                  • API String ID: 4105515805-45149045
                                                  • Opcode ID: 8137547c93396ea1bf734393157ab44d46113366ddec1b181c098de0ae64cdde
                                                  • Instruction ID: a3379b43a28ebfafdad25c66c672e5fe53db1e71c8f642278b46dadc5b0e0c2d
                                                  • Opcode Fuzzy Hash: 8137547c93396ea1bf734393157ab44d46113366ddec1b181c098de0ae64cdde
                                                  • Instruction Fuzzy Hash: 17D193302543129BCB18EF10C459A6F7FAABF95345F184459F8825B3E2DB71DE0ACB91
                                                  APIs
                                                  • SetTextColor.GDI32(?,00000000), ref: 0060A630
                                                  • GetSysColorBrush.USER32(0000000F), ref: 0060A661
                                                  • GetSysColor.USER32(0000000F), ref: 0060A66D
                                                  • SetBkColor.GDI32(?,000000FF), ref: 0060A687
                                                  • SelectObject.GDI32(?,00000000), ref: 0060A696
                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 0060A6C1
                                                  • GetSysColor.USER32(00000010), ref: 0060A6C9
                                                  • CreateSolidBrush.GDI32(00000000), ref: 0060A6D0
                                                  • FrameRect.USER32(?,?,00000000), ref: 0060A6DF
                                                  • DeleteObject.GDI32(00000000), ref: 0060A6E6
                                                  • InflateRect.USER32(?,000000FE,000000FE), ref: 0060A731
                                                  • FillRect.USER32(?,?,00000000), ref: 0060A763
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0060A78E
                                                    • Part of subcall function 0060A8CA: GetSysColor.USER32(00000012), ref: 0060A903
                                                    • Part of subcall function 0060A8CA: SetTextColor.GDI32(?,?), ref: 0060A907
                                                    • Part of subcall function 0060A8CA: GetSysColorBrush.USER32(0000000F), ref: 0060A91D
                                                    • Part of subcall function 0060A8CA: GetSysColor.USER32(0000000F), ref: 0060A928
                                                    • Part of subcall function 0060A8CA: GetSysColor.USER32(00000011), ref: 0060A945
                                                    • Part of subcall function 0060A8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0060A953
                                                    • Part of subcall function 0060A8CA: SelectObject.GDI32(?,00000000), ref: 0060A964
                                                    • Part of subcall function 0060A8CA: SetBkColor.GDI32(?,00000000), ref: 0060A96D
                                                    • Part of subcall function 0060A8CA: SelectObject.GDI32(?,?), ref: 0060A97A
                                                    • Part of subcall function 0060A8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 0060A999
                                                    • Part of subcall function 0060A8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0060A9B0
                                                    • Part of subcall function 0060A8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 0060A9C5
                                                    • Part of subcall function 0060A8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0060A9ED
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                  • String ID:
                                                  • API String ID: 3521893082-0
                                                  • Opcode ID: 6f905c1ce943d3afc59e34a95834f397ff86121908e1761985506f6814e99d60
                                                  • Instruction ID: f970d494eb7be89cf211e347ad8eafae0f7709c5aaa6db5fe167f833a24b004c
                                                  • Opcode Fuzzy Hash: 6f905c1ce943d3afc59e34a95834f397ff86121908e1761985506f6814e99d60
                                                  • Instruction Fuzzy Hash: E491AC72048301EFC7219FA4DC08A9B7BBAFF89320F105B29F9A2961E0D771D845CB52
                                                  APIs
                                                  • DestroyWindow.USER32(00000000), ref: 005F74DE
                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 005F759D
                                                  • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 005F75DB
                                                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 005F75ED
                                                  • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 005F7633
                                                  • GetClientRect.USER32(00000000,?), ref: 005F763F
                                                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 005F7683
                                                  • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 005F7692
                                                  • GetStockObject.GDI32(00000011), ref: 005F76A2
                                                  • SelectObject.GDI32(00000000,00000000), ref: 005F76A6
                                                  • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 005F76B6
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 005F76BF
                                                  • DeleteDC.GDI32(00000000), ref: 005F76C8
                                                  • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 005F76F4
                                                  • SendMessageW.USER32(00000030,00000000,00000001), ref: 005F770B
                                                  • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 005F7746
                                                  • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 005F775A
                                                  • SendMessageW.USER32(00000404,00000001,00000000), ref: 005F776B
                                                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 005F779B
                                                  • GetStockObject.GDI32(00000011), ref: 005F77A6
                                                  • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 005F77B1
                                                  • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 005F77BB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                  • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                  • API String ID: 2910397461-517079104
                                                  • Opcode ID: cb0067d1528786e985ddfa12676915ab60027845abce457763e1eff007ee7361
                                                  • Instruction ID: b45b5ddf9caaf660bdfdd7f1c5538cc4e7047515c2370080c12ad158d5b46b42
                                                  • Opcode Fuzzy Hash: cb0067d1528786e985ddfa12676915ab60027845abce457763e1eff007ee7361
                                                  • Instruction Fuzzy Hash: 4EA16F71A40609BFEB14DBA4DC4AFAF7BAAFB49710F044115FA15A72E1D7B4AD00CB60
                                                  APIs
                                                  • SetErrorMode.KERNEL32(00000001), ref: 005EAD1E
                                                  • GetDriveTypeW.KERNEL32(?,0060FAC0,?,\\.\,0060F910), ref: 005EADFB
                                                  • SetErrorMode.KERNEL32(00000000,0060FAC0,?,\\.\,0060F910), ref: 005EAF59
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ErrorMode$DriveType
                                                  • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                  • API String ID: 2907320926-4222207086
                                                  • Opcode ID: e6334d05e453d9cb9c5500e703ebda74f95e256ebe468c7e524fe05f5277f4f3
                                                  • Instruction ID: b71abc107bb4168eb3a6579dfd0de51f046131b2a037c9984002b0216ac9da9d
                                                  • Opcode Fuzzy Hash: e6334d05e453d9cb9c5500e703ebda74f95e256ebe468c7e524fe05f5277f4f3
                                                  • Instruction Fuzzy Hash: 0E51C8B4644246DFCB18EB32C946CBD7FA2FF48700B214556F897A7291EA30BD01DB92
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: __wcsnicmp
                                                  • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                  • API String ID: 1038674560-86951937
                                                  • Opcode ID: 5d17db25f0cd9e37432c81c0d2cfdfab788fc256630da2590e50220791c1676b
                                                  • Instruction ID: 89a8cfe7d10e917a9aa8e8bf511492fa7860b9e6cba561fabda47d4b48bebf6d
                                                  • Opcode Fuzzy Hash: 5d17db25f0cd9e37432c81c0d2cfdfab788fc256630da2590e50220791c1676b
                                                  • Instruction Fuzzy Hash: 8581F3B0640206ABCB25BA60DC47FEE3FA9FF55700F080025FD45BA1D6EB60EA41D7A1
                                                  APIs
                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 00609AD2
                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00609B8B
                                                  • SendMessageW.USER32(?,00001102,00000002,?), ref: 00609BA7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window
                                                  • String ID: 0
                                                  • API String ID: 2326795674-4108050209
                                                  • Opcode ID: 2c1d840b29ec524d9ff243fa8b128e2ed75fa471e092d48453bd1efdbc746254
                                                  • Instruction ID: eedbb5ba99ebf6bd94f704c63f3b100a681b0a26b29b01857cafdd531afe66f9
                                                  • Opcode Fuzzy Hash: 2c1d840b29ec524d9ff243fa8b128e2ed75fa471e092d48453bd1efdbc746254
                                                  • Instruction Fuzzy Hash: 8E02BC30184201AFE729CF24C848BABBBE7FF89314F04852DF995962E2C775D845CB62
                                                  APIs
                                                  • GetSysColor.USER32(00000012), ref: 0060A903
                                                  • SetTextColor.GDI32(?,?), ref: 0060A907
                                                  • GetSysColorBrush.USER32(0000000F), ref: 0060A91D
                                                  • GetSysColor.USER32(0000000F), ref: 0060A928
                                                  • CreateSolidBrush.GDI32(?), ref: 0060A92D
                                                  • GetSysColor.USER32(00000011), ref: 0060A945
                                                  • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0060A953
                                                  • SelectObject.GDI32(?,00000000), ref: 0060A964
                                                  • SetBkColor.GDI32(?,00000000), ref: 0060A96D
                                                  • SelectObject.GDI32(?,?), ref: 0060A97A
                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 0060A999
                                                  • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0060A9B0
                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 0060A9C5
                                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0060A9ED
                                                  • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0060AA14
                                                  • InflateRect.USER32(?,000000FD,000000FD), ref: 0060AA32
                                                  • DrawFocusRect.USER32(?,?), ref: 0060AA3D
                                                  • GetSysColor.USER32(00000011), ref: 0060AA4B
                                                  • SetTextColor.GDI32(?,00000000), ref: 0060AA53
                                                  • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0060AA67
                                                  • SelectObject.GDI32(?,0060A5FA), ref: 0060AA7E
                                                  • DeleteObject.GDI32(?), ref: 0060AA89
                                                  • SelectObject.GDI32(?,?), ref: 0060AA8F
                                                  • DeleteObject.GDI32(?), ref: 0060AA94
                                                  • SetTextColor.GDI32(?,?), ref: 0060AA9A
                                                  • SetBkColor.GDI32(?,?), ref: 0060AAA4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                  • String ID:
                                                  • API String ID: 1996641542-0
                                                  • Opcode ID: 709c673f994793bd042b9eb2f4f9a8b13ee2cd00182bd5a7d549f53db5034862
                                                  • Instruction ID: 7c9b584c90d3fc32ef0c6add71e301774f0150a9648633b95c4542e78c41141c
                                                  • Opcode Fuzzy Hash: 709c673f994793bd042b9eb2f4f9a8b13ee2cd00182bd5a7d549f53db5034862
                                                  • Instruction Fuzzy Hash: 97514971940208EFDB219FA4DC48EAFBBBAFB49320F115265F911AB2E1D7719940DF90
                                                  APIs
                                                  • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00608AC1
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00608AD2
                                                  • CharNextW.USER32(0000014E), ref: 00608B01
                                                  • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00608B42
                                                  • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00608B58
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00608B69
                                                  • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00608B86
                                                  • SetWindowTextW.USER32(?,0000014E), ref: 00608BD8
                                                  • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00608BEE
                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00608C1F
                                                  • _memset.LIBCMT ref: 00608C44
                                                  • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00608C8D
                                                  • _memset.LIBCMT ref: 00608CEC
                                                  • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00608D16
                                                  • SendMessageW.USER32(?,00001074,?,00000001), ref: 00608D6E
                                                  • SendMessageW.USER32(?,0000133D,?,?), ref: 00608E1B
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00608E3D
                                                  • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00608E87
                                                  • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00608EB4
                                                  • DrawMenuBar.USER32(?), ref: 00608EC3
                                                  • SetWindowTextW.USER32(?,0000014E), ref: 00608EEB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                  • String ID: 0
                                                  • API String ID: 1073566785-4108050209
                                                  • Opcode ID: d57cc7b746fb02edcfd7184f5048bcc1c68d365f6ffca482812f360401af48d6
                                                  • Instruction ID: a75c8ac4994c0a5b4bec1a3b78834794cd9380230f71c87f1e70cbe3b63cdcc7
                                                  • Opcode Fuzzy Hash: d57cc7b746fb02edcfd7184f5048bcc1c68d365f6ffca482812f360401af48d6
                                                  • Instruction Fuzzy Hash: 76E16D70940209AFDB24DF64CC88AEF7BBAEF05750F10815AF955AB2D1DB708981DF60
                                                  APIs
                                                  • GetCursorPos.USER32(?), ref: 006049CA
                                                  • GetDesktopWindow.USER32 ref: 006049DF
                                                  • GetWindowRect.USER32(00000000), ref: 006049E6
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00604A48
                                                  • DestroyWindow.USER32(?), ref: 00604A74
                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00604A9D
                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00604ABB
                                                  • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00604AE1
                                                  • SendMessageW.USER32(?,00000421,?,?), ref: 00604AF6
                                                  • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00604B09
                                                  • IsWindowVisible.USER32(?), ref: 00604B29
                                                  • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00604B44
                                                  • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00604B58
                                                  • GetWindowRect.USER32(?,?), ref: 00604B70
                                                  • MonitorFromPoint.USER32(?,?,00000002), ref: 00604B96
                                                  • GetMonitorInfoW.USER32(00000000,?), ref: 00604BB0
                                                  • CopyRect.USER32(?,?), ref: 00604BC7
                                                  • SendMessageW.USER32(?,00000412,00000000), ref: 00604C32
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                  • String ID: ($0$tooltips_class32
                                                  • API String ID: 698492251-4156429822
                                                  • Opcode ID: 25a79c7a3c8e3a9c68540f606499807f1f74333c46b15a14651fbf62c8b39a47
                                                  • Instruction ID: 09dc18f94847da64b3642e7e7ab76809648133a3a81d646a756307c1343d7ff2
                                                  • Opcode Fuzzy Hash: 25a79c7a3c8e3a9c68540f606499807f1f74333c46b15a14651fbf62c8b39a47
                                                  • Instruction Fuzzy Hash: 67B18DB0648341AFD718DF64C848B6BBBE6BF84314F00891CF999AB2A1DB71EC05CB55
                                                  APIs
                                                  • GetFileVersionInfoSizeW.VERSION(?,?), ref: 005E44AC
                                                  • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 005E44D2
                                                  • _wcscpy.LIBCMT ref: 005E4500
                                                  • _wcscmp.LIBCMT ref: 005E450B
                                                  • _wcscat.LIBCMT ref: 005E4521
                                                  • _wcsstr.LIBCMT ref: 005E452C
                                                  • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 005E4548
                                                  • _wcscat.LIBCMT ref: 005E4591
                                                  • _wcscat.LIBCMT ref: 005E4598
                                                  • _wcsncpy.LIBCMT ref: 005E45C3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                  • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                  • API String ID: 699586101-1459072770
                                                  • Opcode ID: 4e372a57e91088e803bb857d263226d61240d47960f030added6158f4fd9a594
                                                  • Instruction ID: 1b3c63bbd53748aa6af6471978f73abae0546f91fc2ed11df0e7c2843402d1d8
                                                  • Opcode Fuzzy Hash: 4e372a57e91088e803bb857d263226d61240d47960f030added6158f4fd9a594
                                                  • Instruction Fuzzy Hash: 0541FA31A40201BBDB14AB759C4BEBF7FACFF87710F040466F945E61C2EB749A0196A5
                                                  APIs
                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 005828BC
                                                  • GetSystemMetrics.USER32(00000007), ref: 005828C4
                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 005828EF
                                                  • GetSystemMetrics.USER32(00000008), ref: 005828F7
                                                  • GetSystemMetrics.USER32(00000004), ref: 0058291C
                                                  • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00582939
                                                  • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00582949
                                                  • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0058297C
                                                  • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00582990
                                                  • GetClientRect.USER32(00000000,000000FF), ref: 005829AE
                                                  • GetStockObject.GDI32(00000011), ref: 005829CA
                                                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 005829D5
                                                    • Part of subcall function 00582344: GetCursorPos.USER32(?), ref: 00582357
                                                    • Part of subcall function 00582344: ScreenToClient.USER32(006457B0,?), ref: 00582374
                                                    • Part of subcall function 00582344: GetAsyncKeyState.USER32(00000001), ref: 00582399
                                                    • Part of subcall function 00582344: GetAsyncKeyState.USER32(00000002), ref: 005823A7
                                                  • SetTimer.USER32(00000000,00000000,00000028,00581256), ref: 005829FC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                  • String ID: AutoIt v3 GUI
                                                  • API String ID: 1458621304-248962490
                                                  • Opcode ID: 6f7fbc7efe6924d5a90b9a30a955d3c0e5f1ce658b07d7aa2e6b4cba27d8da9a
                                                  • Instruction ID: 8dc4b363e9002aba7868b882c721fa69acbe7530d2764bcd964bcd413cdbd378
                                                  • Opcode Fuzzy Hash: 6f7fbc7efe6924d5a90b9a30a955d3c0e5f1ce658b07d7aa2e6b4cba27d8da9a
                                                  • Instruction Fuzzy Hash: D9B16E75A4020ADFDB14EFA8DC49BAE7FB5FB48710F104129FA16A7290DB74A841CF54
                                                  APIs
                                                  • GetClassNameW.USER32(?,?,00000100), ref: 005DA47A
                                                  • __swprintf.LIBCMT ref: 005DA51B
                                                  • _wcscmp.LIBCMT ref: 005DA52E
                                                  • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 005DA583
                                                  • _wcscmp.LIBCMT ref: 005DA5BF
                                                  • GetClassNameW.USER32(?,?,00000400), ref: 005DA5F6
                                                  • GetDlgCtrlID.USER32(?), ref: 005DA648
                                                  • GetWindowRect.USER32(?,?), ref: 005DA67E
                                                  • GetParent.USER32(?), ref: 005DA69C
                                                  • ScreenToClient.USER32(00000000), ref: 005DA6A3
                                                  • GetClassNameW.USER32(?,?,00000100), ref: 005DA71D
                                                  • _wcscmp.LIBCMT ref: 005DA731
                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 005DA757
                                                  • _wcscmp.LIBCMT ref: 005DA76B
                                                    • Part of subcall function 005A362C: _iswctype.LIBCMT ref: 005A3634
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                  • String ID: %s%u
                                                  • API String ID: 3744389584-679674701
                                                  • Opcode ID: 4b085aba67782b65ea2b01c3b9aa54f4a49ae7cc472f54676cdb2939910df6f5
                                                  • Instruction ID: e5cd0ba05750a95cf038c67f3d27e3dcc59498414af85fb97255d7b9c2076c05
                                                  • Opcode Fuzzy Hash: 4b085aba67782b65ea2b01c3b9aa54f4a49ae7cc472f54676cdb2939910df6f5
                                                  • Instruction Fuzzy Hash: 88A1B371604606EFDB25DF68C884BABBBE8FF44314F00452BF999D2250DB30E955CB92
                                                  APIs
                                                  • GetClassNameW.USER32(00000008,?,00000400), ref: 005DAF18
                                                  • _wcscmp.LIBCMT ref: 005DAF29
                                                  • GetWindowTextW.USER32(00000001,?,00000400), ref: 005DAF51
                                                  • CharUpperBuffW.USER32(?,00000000), ref: 005DAF6E
                                                  • _wcscmp.LIBCMT ref: 005DAF8C
                                                  • _wcsstr.LIBCMT ref: 005DAF9D
                                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 005DAFD5
                                                  • _wcscmp.LIBCMT ref: 005DAFE5
                                                  • GetWindowTextW.USER32(00000002,?,00000400), ref: 005DB00C
                                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 005DB055
                                                  • _wcscmp.LIBCMT ref: 005DB065
                                                  • GetClassNameW.USER32(00000010,?,00000400), ref: 005DB08D
                                                  • GetWindowRect.USER32(00000004,?), ref: 005DB0F6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                  • String ID: @$ThumbnailClass
                                                  • API String ID: 1788623398-1539354611
                                                  • Opcode ID: b5fbfc9ef704180146c4148e69b1ac7d2967deb4a0c752b860bf43005b1efa30
                                                  • Instruction ID: 4aeb1d669c1a4ec58e8ba3bef7667b626bca33cac0e18d6f4b9f0e99ec41a28f
                                                  • Opcode Fuzzy Hash: b5fbfc9ef704180146c4148e69b1ac7d2967deb4a0c752b860bf43005b1efa30
                                                  • Instruction Fuzzy Hash: 87818E71108206DBEB25DF18C889BAB7FE9FF84314F04846BFD859A291DB30D945CB62
                                                  APIs
                                                    • Part of subcall function 00582612: GetWindowLongW.USER32(?,000000EB), ref: 00582623
                                                  • DragQueryPoint.SHELL32(?,?), ref: 0060C627
                                                    • Part of subcall function 0060AB37: ClientToScreen.USER32(?,?), ref: 0060AB60
                                                    • Part of subcall function 0060AB37: GetWindowRect.USER32(?,?), ref: 0060ABD6
                                                    • Part of subcall function 0060AB37: PtInRect.USER32(?,?,0060C014), ref: 0060ABE6
                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 0060C690
                                                  • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0060C69B
                                                  • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0060C6BE
                                                  • _wcscat.LIBCMT ref: 0060C6EE
                                                  • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0060C705
                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 0060C71E
                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 0060C735
                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 0060C757
                                                  • DragFinish.SHELL32(?), ref: 0060C75E
                                                  • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0060C851
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                  • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$pbd
                                                  • API String ID: 169749273-3556046680
                                                  • Opcode ID: 16a9def5494045d2d578f335416bd21588a7f582b99fafe8575682e8ef8a3c95
                                                  • Instruction ID: 20a189ea2a8e5a16c0d195db2a500f88c99ff779ec0894e15a989a07848dca82
                                                  • Opcode Fuzzy Hash: 16a9def5494045d2d578f335416bd21588a7f582b99fafe8575682e8ef8a3c95
                                                  • Instruction Fuzzy Hash: 15616C71148301AFC715EF64CC89DABBFEAFF89310F400A2DF595921A1DB719909CB52
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: __wcsnicmp
                                                  • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                  • API String ID: 1038674560-1810252412
                                                  • Opcode ID: 7e81881029dc3f482d0c1b1d2eaeedc6a4b429416c99e6f793681f99ded9f05d
                                                  • Instruction ID: 53c8c8ede42e6759d97a263fbc8ac1899ec00245e205410654c2ae3131ca417e
                                                  • Opcode Fuzzy Hash: 7e81881029dc3f482d0c1b1d2eaeedc6a4b429416c99e6f793681f99ded9f05d
                                                  • Instruction Fuzzy Hash: 0D318471A4820AA7DB24FA54DD07EAF7F65BF50721F600416F841711E2FF51AF04D692
                                                  APIs
                                                  • LoadCursorW.USER32(00000000,00007F8A), ref: 005F5013
                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 005F501E
                                                  • LoadCursorW.USER32(00000000,00007F03), ref: 005F5029
                                                  • LoadCursorW.USER32(00000000,00007F8B), ref: 005F5034
                                                  • LoadCursorW.USER32(00000000,00007F01), ref: 005F503F
                                                  • LoadCursorW.USER32(00000000,00007F81), ref: 005F504A
                                                  • LoadCursorW.USER32(00000000,00007F88), ref: 005F5055
                                                  • LoadCursorW.USER32(00000000,00007F80), ref: 005F5060
                                                  • LoadCursorW.USER32(00000000,00007F86), ref: 005F506B
                                                  • LoadCursorW.USER32(00000000,00007F83), ref: 005F5076
                                                  • LoadCursorW.USER32(00000000,00007F85), ref: 005F5081
                                                  • LoadCursorW.USER32(00000000,00007F82), ref: 005F508C
                                                  • LoadCursorW.USER32(00000000,00007F84), ref: 005F5097
                                                  • LoadCursorW.USER32(00000000,00007F04), ref: 005F50A2
                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 005F50AD
                                                  • LoadCursorW.USER32(00000000,00007F89), ref: 005F50B8
                                                  • GetCursorInfo.USER32(?), ref: 005F50C8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Cursor$Load$Info
                                                  • String ID:
                                                  • API String ID: 2577412497-0
                                                  • Opcode ID: 8aa718e4dbd698c1503a42bf3d6f3d96d9c4fce1866732b9affac0f4ef1f5c0d
                                                  • Instruction ID: c4b35bc9a00facaeca855be040a6a59b44a523838981a344c973833c29462897
                                                  • Opcode Fuzzy Hash: 8aa718e4dbd698c1503a42bf3d6f3d96d9c4fce1866732b9affac0f4ef1f5c0d
                                                  • Instruction Fuzzy Hash: A031E3B1D4831E6ADB109FB68C8996FBFECFB04750F50452AA64DE7280EA786500CF91
                                                  APIs
                                                  • _memset.LIBCMT ref: 0060A259
                                                  • DestroyWindow.USER32(?,?), ref: 0060A2D3
                                                    • Part of subcall function 00587BCC: _memmove.LIBCMT ref: 00587C06
                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0060A34D
                                                  • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0060A36F
                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0060A382
                                                  • DestroyWindow.USER32(00000000), ref: 0060A3A4
                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00580000,00000000), ref: 0060A3DB
                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0060A3F4
                                                  • GetDesktopWindow.USER32 ref: 0060A40D
                                                  • GetWindowRect.USER32(00000000), ref: 0060A414
                                                  • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0060A42C
                                                  • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0060A444
                                                    • Part of subcall function 005825DB: GetWindowLongW.USER32(?,000000EB), ref: 005825EC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                  • String ID: 0$tooltips_class32
                                                  • API String ID: 1297703922-3619404913
                                                  • Opcode ID: 99736ad78df45b28ff19b143f4e633958d0d5b678b8a1ef2e54de6ac92ab77f6
                                                  • Instruction ID: c4a8ec8b7e47e854f054f2d565f7d324cd3242d6c4daff60ed7e565724f5d80e
                                                  • Opcode Fuzzy Hash: 99736ad78df45b28ff19b143f4e633958d0d5b678b8a1ef2e54de6ac92ab77f6
                                                  • Instruction Fuzzy Hash: 1C717874180305AFD729DF68C849FAB7BE6FB89340F04452DF985972A1DBB1E902CB52
                                                  APIs
                                                  • CharUpperBuffW.USER32(?,?), ref: 00604424
                                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0060446F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: BuffCharMessageSendUpper
                                                  • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                  • API String ID: 3974292440-4258414348
                                                  • Opcode ID: 143164d7a365301d617be55162527f1059e1708f95ff326dd939f5018d8e83df
                                                  • Instruction ID: 2b60e9e3771f3c35a7a3c963dc9fd4c3d44c0d624f2f766d51b85d72d46e4b9f
                                                  • Opcode Fuzzy Hash: 143164d7a365301d617be55162527f1059e1708f95ff326dd939f5018d8e83df
                                                  • Instruction Fuzzy Hash: 09916E702143129FCB18EF10C455A6EBBE2BF95354F044859F8966B3E2DB31ED0ACB91
                                                  APIs
                                                  • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0060B8B4
                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,006091C2), ref: 0060B910
                                                  • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0060B949
                                                  • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 0060B98C
                                                  • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0060B9C3
                                                  • FreeLibrary.KERNEL32(?), ref: 0060B9CF
                                                  • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0060B9DF
                                                  • DestroyIcon.USER32(?,?,?,?,?,006091C2), ref: 0060B9EE
                                                  • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0060BA0B
                                                  • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0060BA17
                                                    • Part of subcall function 005A2EFD: __wcsicmp_l.LIBCMT ref: 005A2F86
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                  • String ID: .dll$.exe$.icl
                                                  • API String ID: 1212759294-1154884017
                                                  • Opcode ID: 9405f27f9d874ff3e34583d91d63d3aae8b7b5d045e464d56f368fffe77fa914
                                                  • Instruction ID: 8cb2ba743d52df322ff7ce6ed8351030182924ca573845ecc812fe6d23e23e23
                                                  • Opcode Fuzzy Hash: 9405f27f9d874ff3e34583d91d63d3aae8b7b5d045e464d56f368fffe77fa914
                                                  • Instruction Fuzzy Hash: 5161DC7198020ABAEB28DF64DC46FBF7BADFB09710F108515F915D62D0DB74A980DBA0
                                                  APIs
                                                  • GetLocalTime.KERNEL32(?), ref: 005EDCDC
                                                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 005EDCEC
                                                  • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 005EDCF8
                                                  • __wsplitpath.LIBCMT ref: 005EDD56
                                                  • _wcscat.LIBCMT ref: 005EDD6E
                                                  • _wcscat.LIBCMT ref: 005EDD80
                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 005EDD95
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 005EDDA9
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 005EDDDB
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 005EDDFC
                                                  • _wcscpy.LIBCMT ref: 005EDE08
                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 005EDE47
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                  • String ID: *.*
                                                  • API String ID: 3566783562-438819550
                                                  • Opcode ID: f35ded63e2239d3283d53a530fe2f4c849fc2184a473b9101724da1e3fe1b34c
                                                  • Instruction ID: 4914286685704ed2c3c120a0960e0684c91bb05f8b9cda43692e518d01b10b1e
                                                  • Opcode Fuzzy Hash: f35ded63e2239d3283d53a530fe2f4c849fc2184a473b9101724da1e3fe1b34c
                                                  • Instruction Fuzzy Hash: 23616B725042469FCB14EF61C8489AFBBF8FF89314F04491DF98997251DB31EA45CBA2
                                                  APIs
                                                  • LoadStringW.USER32(00000066,?,00000FFF,00000016), ref: 005E9C7F
                                                    • Part of subcall function 00587DE1: _memmove.LIBCMT ref: 00587E22
                                                  • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 005E9CA0
                                                  • __swprintf.LIBCMT ref: 005E9CF9
                                                  • __swprintf.LIBCMT ref: 005E9D12
                                                  • _wprintf.LIBCMT ref: 005E9DB9
                                                  • _wprintf.LIBCMT ref: 005E9DD7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: LoadString__swprintf_wprintf$_memmove
                                                  • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                  • API String ID: 311963372-3080491070
                                                  • Opcode ID: 61fb76b5ba750745cb0df10512a534fb48471ceb9c0b55bc38a4081f34cf6a5d
                                                  • Instruction ID: fd4b1e5c49c1fc5b40b990fdd724600acc95574ffc98fd641f6e121532982450
                                                  • Opcode Fuzzy Hash: 61fb76b5ba750745cb0df10512a534fb48471ceb9c0b55bc38a4081f34cf6a5d
                                                  • Instruction Fuzzy Hash: 46516F7190061AAACB14FBA0CD4ADEEBF79BF58300F600165F90572062EB316F58CB61
                                                  APIs
                                                    • Part of subcall function 00589837: __itow.LIBCMT ref: 00589862
                                                    • Part of subcall function 00589837: __swprintf.LIBCMT ref: 005898AC
                                                  • CharLowerBuffW.USER32(?,?), ref: 005EA3CB
                                                  • GetDriveTypeW.KERNEL32 ref: 005EA418
                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 005EA460
                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 005EA497
                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 005EA4C5
                                                    • Part of subcall function 00587BCC: _memmove.LIBCMT ref: 00587C06
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                  • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                  • API String ID: 2698844021-4113822522
                                                  • Opcode ID: 58d9030230843fb148be2f9c32892f7f6c9fcaf565396115a520df9543216193
                                                  • Instruction ID: ef5a3fad03e0b43b9d9d68727fc8a3beb7f4251332d7ca278ad4b6b543015f0d
                                                  • Opcode Fuzzy Hash: 58d9030230843fb148be2f9c32892f7f6c9fcaf565396115a520df9543216193
                                                  • Instruction Fuzzy Hash: 9E5171711143069FC704EF21C88596EBBE5FF88718F14886DF896672A1DB31EE09CB82
                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,005BE029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 005DF8DF
                                                  • LoadStringW.USER32(00000000,?,005BE029,00000001), ref: 005DF8E8
                                                    • Part of subcall function 00587DE1: _memmove.LIBCMT ref: 00587E22
                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,005BE029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 005DF90A
                                                  • LoadStringW.USER32(00000000,?,005BE029,00000001), ref: 005DF90D
                                                  • __swprintf.LIBCMT ref: 005DF95D
                                                  • __swprintf.LIBCMT ref: 005DF96E
                                                  • _wprintf.LIBCMT ref: 005DFA17
                                                  • MessageBoxW.USER32(00000000,?,?,00011010), ref: 005DFA2E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                  • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                  • API String ID: 984253442-2268648507
                                                  • Opcode ID: 207d4d0bcb8e4fdb051ff5f846476afe2a4dc5128341bd6eaa2d96af54577e3f
                                                  • Instruction ID: c3611547b92ce586ad46264e097e03c57b5c97379ce6800a895f65e1875f3c09
                                                  • Opcode Fuzzy Hash: 207d4d0bcb8e4fdb051ff5f846476afe2a4dc5128341bd6eaa2d96af54577e3f
                                                  • Instruction Fuzzy Hash: C441527290010EAACB14FBE4DD5ADEEBB79BF98300F200065F90576191EA319F49CB61
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00609207,?,?), ref: 0060BA56
                                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00609207,?,?,00000000,?), ref: 0060BA6D
                                                  • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00609207,?,?,00000000,?), ref: 0060BA78
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,00609207,?,?,00000000,?), ref: 0060BA85
                                                  • GlobalLock.KERNEL32(00000000), ref: 0060BA8E
                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00609207,?,?,00000000,?), ref: 0060BA9D
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0060BAA6
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,00609207,?,?,00000000,?), ref: 0060BAAD
                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00609207,?,?,00000000,?), ref: 0060BABE
                                                  • OleLoadPicture.OLEAUT32(?,00000000,00000000,00612CAC,?), ref: 0060BAD7
                                                  • GlobalFree.KERNEL32(00000000), ref: 0060BAE7
                                                  • GetObjectW.GDI32(00000000,00000018,?), ref: 0060BB0B
                                                  • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 0060BB36
                                                  • DeleteObject.GDI32(00000000), ref: 0060BB5E
                                                  • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0060BB74
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                  • String ID:
                                                  • API String ID: 3840717409-0
                                                  • Opcode ID: 1904a201d8b80789c0d0c02e616945a63647e36a143dba78b932440ab466d993
                                                  • Instruction ID: 60d8a034653fed082906d06fd8e8bc65f48545bd246989e0abbb27752fbc1e0c
                                                  • Opcode Fuzzy Hash: 1904a201d8b80789c0d0c02e616945a63647e36a143dba78b932440ab466d993
                                                  • Instruction Fuzzy Hash: 10411B75680204EFDB25DFA5DC48EAB7BBAFB89711F109068F905D72A0DB709E41CB60
                                                  APIs
                                                  • __wsplitpath.LIBCMT ref: 005EDA10
                                                  • _wcscat.LIBCMT ref: 005EDA28
                                                  • _wcscat.LIBCMT ref: 005EDA3A
                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 005EDA4F
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 005EDA63
                                                  • GetFileAttributesW.KERNEL32(?), ref: 005EDA7B
                                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 005EDA95
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 005EDAA7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                  • String ID: *.*
                                                  • API String ID: 34673085-438819550
                                                  • Opcode ID: 589a0e8228c081aa25e8d449cc103c0aa45746a0a2f98ca7d08d27cf62d8cae2
                                                  • Instruction ID: 18c84372df767d6e7125b1e85553ba4b06dccfc4998c563a358316b54c3bdc0a
                                                  • Opcode Fuzzy Hash: 589a0e8228c081aa25e8d449cc103c0aa45746a0a2f98ca7d08d27cf62d8cae2
                                                  • Instruction Fuzzy Hash: 2B8193715043859FCB68EF65C84496ABBF8BF89314F184C2EF8C9DB252E630D945CB62
                                                  APIs
                                                    • Part of subcall function 00582612: GetWindowLongW.USER32(?,000000EB), ref: 00582623
                                                  • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0060C1FC
                                                  • GetFocus.USER32 ref: 0060C20C
                                                  • GetDlgCtrlID.USER32(00000000), ref: 0060C217
                                                  • _memset.LIBCMT ref: 0060C342
                                                  • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0060C36D
                                                  • GetMenuItemCount.USER32(?), ref: 0060C38D
                                                  • GetMenuItemID.USER32(?,00000000), ref: 0060C3A0
                                                  • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0060C3D4
                                                  • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0060C41C
                                                  • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0060C454
                                                  • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0060C489
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                  • String ID: 0
                                                  • API String ID: 1296962147-4108050209
                                                  • Opcode ID: c579c84e2a798efb9b320968f050f1a573d88d1de124f7d71635692e8c3bdc59
                                                  • Instruction ID: e32cd06589159b799f447323b4a360d92a961dd7f8d5f128246cb4816dee8935
                                                  • Opcode Fuzzy Hash: c579c84e2a798efb9b320968f050f1a573d88d1de124f7d71635692e8c3bdc59
                                                  • Instruction Fuzzy Hash: 8C8190702883119FD728DF54C894AABBBEAFB88724F004A2DF995973D1D770D905CB92
                                                  APIs
                                                  • GetDC.USER32(00000000), ref: 005F738F
                                                  • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 005F739B
                                                  • CreateCompatibleDC.GDI32(?), ref: 005F73A7
                                                  • SelectObject.GDI32(00000000,?), ref: 005F73B4
                                                  • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 005F7408
                                                  • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 005F7444
                                                  • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 005F7468
                                                  • SelectObject.GDI32(00000006,?), ref: 005F7470
                                                  • DeleteObject.GDI32(?), ref: 005F7479
                                                  • DeleteDC.GDI32(00000006), ref: 005F7480
                                                  • ReleaseDC.USER32(00000000,?), ref: 005F748B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                  • String ID: (
                                                  • API String ID: 2598888154-3887548279
                                                  • Opcode ID: bc89b6b688a9987c3fdea40d1d515574149aeb8e0cc4f1c870b571c55f478af0
                                                  • Instruction ID: 41200a3dc3d6fc2a2d50e80e7a8fd7c6d1ecef8b82d37cbc78b90d3659c38c43
                                                  • Opcode Fuzzy Hash: bc89b6b688a9987c3fdea40d1d515574149aeb8e0cc4f1c870b571c55f478af0
                                                  • Instruction Fuzzy Hash: D8514B71944209EFDB24CFA8CC84EAFBBB9FF48310F14842DFA5A97251D775A9408B50
                                                  APIs
                                                    • Part of subcall function 005A0957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00586B0C,?,00008000), ref: 005A0973
                                                    • Part of subcall function 00584750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00584743,?,?,005837AE,?), ref: 00584770
                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00586BAD
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00586CFA
                                                    • Part of subcall function 0058586D: _wcscpy.LIBCMT ref: 005858A5
                                                    • Part of subcall function 005A363D: _iswctype.LIBCMT ref: 005A3645
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                  • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                  • API String ID: 537147316-1018226102
                                                  • Opcode ID: 23922ea5e1f63c9f56952482201e5cfbf633660822ca79ca2f20f73e709000f2
                                                  • Instruction ID: c7b329af0807fc43b8174ad6874e296d58ec95a0813fca4cf77b1350272f695a
                                                  • Opcode Fuzzy Hash: 23922ea5e1f63c9f56952482201e5cfbf633660822ca79ca2f20f73e709000f2
                                                  • Instruction Fuzzy Hash: 450249711083429FC724EF24C8869AEBFE5BFD9314F14491DF886A72A1DB30E949CB52
                                                  APIs
                                                  • _memset.LIBCMT ref: 005E2D50
                                                  • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 005E2DDD
                                                  • GetMenuItemCount.USER32(00645890), ref: 005E2E66
                                                  • DeleteMenu.USER32(00645890,00000005,00000000,000000F5,?,?), ref: 005E2EF6
                                                  • DeleteMenu.USER32(00645890,00000004,00000000), ref: 005E2EFE
                                                  • DeleteMenu.USER32(00645890,00000006,00000000), ref: 005E2F06
                                                  • DeleteMenu.USER32(00645890,00000003,00000000), ref: 005E2F0E
                                                  • GetMenuItemCount.USER32(00645890), ref: 005E2F16
                                                  • SetMenuItemInfoW.USER32(00645890,00000004,00000000,00000030), ref: 005E2F4C
                                                  • GetCursorPos.USER32(?), ref: 005E2F56
                                                  • SetForegroundWindow.USER32(00000000), ref: 005E2F5F
                                                  • TrackPopupMenuEx.USER32(00645890,00000000,?,00000000,00000000,00000000), ref: 005E2F72
                                                  • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 005E2F7E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                  • String ID:
                                                  • API String ID: 3993528054-0
                                                  • Opcode ID: 9464a13804015b785781a4e76e01f732de5382a4b3484758a685e5f64ee98ebd
                                                  • Instruction ID: ed1f5c76c42392bc0cf9a20f5a0bc2b938b038637d6b8a4f509f32044f0f3a8a
                                                  • Opcode Fuzzy Hash: 9464a13804015b785781a4e76e01f732de5382a4b3484758a685e5f64ee98ebd
                                                  • Instruction Fuzzy Hash: 6D711470640296BFEB298F56DC89FAABF6DFF04324F100216F665AA1E5C7B15C10CB91
                                                  APIs
                                                  • VariantInit.OLEAUT32(?), ref: 005F88D7
                                                  • CoInitialize.OLE32(00000000), ref: 005F8904
                                                  • CoUninitialize.OLE32 ref: 005F890E
                                                  • GetRunningObjectTable.OLE32(00000000,?), ref: 005F8A0E
                                                  • SetErrorMode.KERNEL32(00000001,00000029), ref: 005F8B3B
                                                  • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00612C0C), ref: 005F8B6F
                                                  • CoGetObject.OLE32(?,00000000,00612C0C,?), ref: 005F8B92
                                                  • SetErrorMode.KERNEL32(00000000), ref: 005F8BA5
                                                  • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 005F8C25
                                                  • VariantClear.OLEAUT32(?), ref: 005F8C35
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                  • String ID: ,,a
                                                  • API String ID: 2395222682-3448921334
                                                  • Opcode ID: 68f5500d9814958d40dc156443703bba6a4b4a1a51148b73aca2ae5b56bf1478
                                                  • Instruction ID: 0b8de62594a0e99e558e68c934deb301a3c43702bc0e62d92de5b1eab67411d6
                                                  • Opcode Fuzzy Hash: 68f5500d9814958d40dc156443703bba6a4b4a1a51148b73aca2ae5b56bf1478
                                                  • Instruction Fuzzy Hash: A0C103B160830A9FC700EF64C88496BBBE9FF89348F04495DFA899B251DB75ED05CB52
                                                  APIs
                                                    • Part of subcall function 00587BCC: _memmove.LIBCMT ref: 00587C06
                                                  • _memset.LIBCMT ref: 005D786B
                                                  • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 005D78A0
                                                  • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 005D78BC
                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 005D78D8
                                                  • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 005D7902
                                                  • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 005D792A
                                                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 005D7935
                                                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 005D793A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                  • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                  • API String ID: 1411258926-22481851
                                                  • Opcode ID: a4bb9c925557c0ed4ff99d11206a8e5dbc0bc3902cfe615f23a379b8a600d085
                                                  • Instruction ID: 236d4bc794e3c101d37fd4219df9f850db0b7fdfe7240f64a58e918896879c07
                                                  • Opcode Fuzzy Hash: a4bb9c925557c0ed4ff99d11206a8e5dbc0bc3902cfe615f23a379b8a600d085
                                                  • Instruction Fuzzy Hash: BE410972C1462DAACB21EBA4DC59DEEBB79FF48710F44402AF905B3261EB309D05CB90
                                                  APIs
                                                  • CharUpperBuffW.USER32(?,?,?,?,?,?,?,005FFDAD,?,?), ref: 00600E31
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: BuffCharUpper
                                                  • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                  • API String ID: 3964851224-909552448
                                                  • Opcode ID: 032935ff3fbc5a855453cb5f2b9402397a7d862ddf659af2c48972045041d55f
                                                  • Instruction ID: 3ecedc0636fc7db08bf3cf21a79dff844cb638a8ec17ef93a9be493305cdaa45
                                                  • Opcode Fuzzy Hash: 032935ff3fbc5a855453cb5f2b9402397a7d862ddf659af2c48972045041d55f
                                                  • Instruction Fuzzy Hash: 0E41793115025B8BEF14EF10D859AEF3BA2BF52354F184424FC552B2D2DBB0991ADBA0
                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,005BE2A0,00000010,?,Bad directive syntax error,0060F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 005DF7C2
                                                  • LoadStringW.USER32(00000000,?,005BE2A0,00000010), ref: 005DF7C9
                                                    • Part of subcall function 00587DE1: _memmove.LIBCMT ref: 00587E22
                                                  • _wprintf.LIBCMT ref: 005DF7FC
                                                  • __swprintf.LIBCMT ref: 005DF81E
                                                  • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 005DF88D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                                  • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                  • API String ID: 1506413516-4153970271
                                                  • Opcode ID: b5030114d7eb75105ee8bfc2c9cf2ce9ae238bf38b383c53a7955625a77d8902
                                                  • Instruction ID: 3579ada7fec901075ee2e8272888f8ba13523fee83852839a9e2307dc61b6eca
                                                  • Opcode Fuzzy Hash: b5030114d7eb75105ee8bfc2c9cf2ce9ae238bf38b383c53a7955625a77d8902
                                                  • Instruction Fuzzy Hash: 8521713295021EEFCF11EF90CC0AEEE7B39BF18304F040866F905761A1EA719A58DB51
                                                  APIs
                                                    • Part of subcall function 00587BCC: _memmove.LIBCMT ref: 00587C06
                                                    • Part of subcall function 00587924: _memmove.LIBCMT ref: 005879AD
                                                  • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 005E5330
                                                  • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 005E5346
                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 005E5357
                                                  • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 005E5369
                                                  • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 005E537A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: SendString$_memmove
                                                  • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                  • API String ID: 2279737902-1007645807
                                                  • Opcode ID: f77de0652aab87439a97585bdba852b90076d71b8b57ce753054e8e7c5a00460
                                                  • Instruction ID: 5d533a19fbd6814a4a2690a65c58dcac5babc93ebada9fdab50d87af54337a32
                                                  • Opcode Fuzzy Hash: f77de0652aab87439a97585bdba852b90076d71b8b57ce753054e8e7c5a00460
                                                  • Instruction Fuzzy Hash: E1116361A5065E7DD724BA72CC4ADFFAE7DFBD9B44F100819B811A30D1EEA05D04C6A0
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                  • String ID: 0.0.0.0
                                                  • API String ID: 208665112-3771769585
                                                  • Opcode ID: ba05978c15222682a462ad390d2b132bde76202bbec68c5c2f91bc879819fb9f
                                                  • Instruction ID: 15ad578ab7303fb47cb7a92726b040fa115eddb2ce6279426b7c81a1f5dfc66d
                                                  • Opcode Fuzzy Hash: ba05978c15222682a462ad390d2b132bde76202bbec68c5c2f91bc879819fb9f
                                                  • Instruction Fuzzy Hash: 241105325001156FCB28AB359C4AEEF7BBCFB42311F0041B6F58592091FF718A828A91
                                                  APIs
                                                  • timeGetTime.WINMM ref: 005E4F7A
                                                    • Part of subcall function 005A049F: timeGetTime.WINMM(?,7694B400,00590E7B), ref: 005A04A3
                                                  • Sleep.KERNEL32(0000000A), ref: 005E4FA6
                                                  • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 005E4FCA
                                                  • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 005E4FEC
                                                  • SetActiveWindow.USER32 ref: 005E500B
                                                  • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 005E5019
                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 005E5038
                                                  • Sleep.KERNEL32(000000FA), ref: 005E5043
                                                  • IsWindow.USER32 ref: 005E504F
                                                  • EndDialog.USER32(00000000), ref: 005E5060
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                  • String ID: BUTTON
                                                  • API String ID: 1194449130-3405671355
                                                  • Opcode ID: 97b9f01f53e0684fcd85daa9b169e51e98a4d122729fad13595631ecd1ab4341
                                                  • Instruction ID: 7eb82dc0ae99899198c7b5f4c337e32dee1aa6663fef5d12629406025c5f7a4f
                                                  • Opcode Fuzzy Hash: 97b9f01f53e0684fcd85daa9b169e51e98a4d122729fad13595631ecd1ab4341
                                                  • Instruction Fuzzy Hash: 8A21A178640745AFE7295F72EC8CA673F6BFB47749F043024F142826B1DBB18E508A62
                                                  APIs
                                                    • Part of subcall function 00589837: __itow.LIBCMT ref: 00589862
                                                    • Part of subcall function 00589837: __swprintf.LIBCMT ref: 005898AC
                                                  • CoInitialize.OLE32(00000000), ref: 005ED5EA
                                                  • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 005ED67D
                                                  • SHGetDesktopFolder.SHELL32(?), ref: 005ED691
                                                  • CoCreateInstance.OLE32(00612D7C,00000000,00000001,00638C1C,?), ref: 005ED6DD
                                                  • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 005ED74C
                                                  • CoTaskMemFree.OLE32(?,?), ref: 005ED7A4
                                                  • _memset.LIBCMT ref: 005ED7E1
                                                  • SHBrowseForFolderW.SHELL32(?), ref: 005ED81D
                                                  • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 005ED840
                                                  • CoTaskMemFree.OLE32(00000000), ref: 005ED847
                                                  • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 005ED87E
                                                  • CoUninitialize.OLE32(00000001,00000000), ref: 005ED880
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                  • String ID:
                                                  • API String ID: 1246142700-0
                                                  • Opcode ID: 0c7fe6647c7361337d0b3c116a219a0b01f8474f84ffae95ad5eef811c5a48bf
                                                  • Instruction ID: 92bac911dfe8ff66e6e8407f35d0ca58f5a63b19e3f63ccb7e4afd4bf0ac45cd
                                                  • Opcode Fuzzy Hash: 0c7fe6647c7361337d0b3c116a219a0b01f8474f84ffae95ad5eef811c5a48bf
                                                  • Instruction Fuzzy Hash: 48B1D975A00109AFDB14DFA5C888DAEBBF9FF89314B148469F909EB261DB30ED45CB50
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000001), ref: 005DC283
                                                  • GetWindowRect.USER32(00000000,?), ref: 005DC295
                                                  • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 005DC2F3
                                                  • GetDlgItem.USER32(?,00000002), ref: 005DC2FE
                                                  • GetWindowRect.USER32(00000000,?), ref: 005DC310
                                                  • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 005DC364
                                                  • GetDlgItem.USER32(?,000003E9), ref: 005DC372
                                                  • GetWindowRect.USER32(00000000,?), ref: 005DC383
                                                  • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 005DC3C6
                                                  • GetDlgItem.USER32(?,000003EA), ref: 005DC3D4
                                                  • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 005DC3F1
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 005DC3FE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Window$ItemMoveRect$Invalidate
                                                  • String ID:
                                                  • API String ID: 3096461208-0
                                                  • Opcode ID: 89c7dfe64761593304df03580c8e1dea679aea850a33e9f9b3d2c6d3161b888b
                                                  • Instruction ID: df048d140d5f4f802166fd8fc2f827b8c212bc7a865ecafdb664757ccec76bcf
                                                  • Opcode Fuzzy Hash: 89c7dfe64761593304df03580c8e1dea679aea850a33e9f9b3d2c6d3161b888b
                                                  • Instruction Fuzzy Hash: 21513071B40205ABDB18CFADDD89AAEBBBAFB88711F14852EF515D7290DB719D00CB10
                                                  APIs
                                                    • Part of subcall function 00581B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00582036,?,00000000,?,?,?,?,005816CB,00000000,?), ref: 00581B9A
                                                  • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 005820D3
                                                  • KillTimer.USER32(-00000001,?,?,?,?,005816CB,00000000,?,?,00581AE2,?,?), ref: 0058216E
                                                  • DestroyAcceleratorTable.USER32(00000000), ref: 005BBCA6
                                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,005816CB,00000000,?,?,00581AE2,?,?), ref: 005BBCD7
                                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,005816CB,00000000,?,?,00581AE2,?,?), ref: 005BBCEE
                                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,005816CB,00000000,?,?,00581AE2,?,?), ref: 005BBD0A
                                                  • DeleteObject.GDI32(00000000), ref: 005BBD1C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                  • String ID:
                                                  • API String ID: 641708696-0
                                                  • Opcode ID: 98a7c2aa038a3d27ed243dc545311679db0ad8466c53b49d8fa6336ce200c3bd
                                                  • Instruction ID: ce5b227d2a2c080bb19dcf9b46406699839e2407bb18147097b717a828b6d16a
                                                  • Opcode Fuzzy Hash: 98a7c2aa038a3d27ed243dc545311679db0ad8466c53b49d8fa6336ce200c3bd
                                                  • Instruction Fuzzy Hash: 46619C34101A11DFDB35AF14D94CB2ABFF2FB41312F209929E843AA971C7B5B881DB91
                                                  APIs
                                                    • Part of subcall function 005825DB: GetWindowLongW.USER32(?,000000EB), ref: 005825EC
                                                  • GetSysColor.USER32(0000000F), ref: 005821D3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ColorLongWindow
                                                  • String ID:
                                                  • API String ID: 259745315-0
                                                  • Opcode ID: 5276795f9a45d024dce939c704d25aa351f4c1fbdd0580746245d377f3aa3433
                                                  • Instruction ID: 1001767ec5585771e9d4cd4d7e848464cfcf8f670ce574d362f7cdcb85519e0d
                                                  • Opcode Fuzzy Hash: 5276795f9a45d024dce939c704d25aa351f4c1fbdd0580746245d377f3aa3433
                                                  • Instruction Fuzzy Hash: 18418035140540EFDB25AF28DC88BB93F66FB06331F1442A5FE669A1E2C7B18C42DB61
                                                  APIs
                                                  • CharLowerBuffW.USER32(?,?,0060F910), ref: 005EA90B
                                                  • GetDriveTypeW.KERNEL32(00000061,006389A0,00000061), ref: 005EA9D5
                                                  • _wcscpy.LIBCMT ref: 005EA9FF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: BuffCharDriveLowerType_wcscpy
                                                  • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                  • API String ID: 2820617543-1000479233
                                                  • Opcode ID: 7f7388d0b04dcd824f5bc169959640954cea627c6164d0ad23003a07a8fc6472
                                                  • Instruction ID: 613d3d9b6d738813475f7819e7e16164cf2ab0bfaddf7642f512a4dc08ad72fa
                                                  • Opcode Fuzzy Hash: 7f7388d0b04dcd824f5bc169959640954cea627c6164d0ad23003a07a8fc6472
                                                  • Instruction Fuzzy Hash: 27516E311183429FC314EF25C896AAFBFA5FFC5304F554829F89597292DB31A909CB93
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: __i64tow__itow__swprintf
                                                  • String ID: %.15g$0x%p$False$True
                                                  • API String ID: 421087845-2263619337
                                                  • Opcode ID: c8e4d525326093299a51eee003c546de9c05d1e79e493ab73738f7b813264483
                                                  • Instruction ID: 6393e72ed69f6554fa4c31bb1a258331eba126c9baa9e08f756b3d8c020bb660
                                                  • Opcode Fuzzy Hash: c8e4d525326093299a51eee003c546de9c05d1e79e493ab73738f7b813264483
                                                  • Instruction Fuzzy Hash: 8E41CA71500206AFDB24EF74DC46EBA7FE9FF46304F24486EF949E7291EA31A9418B10
                                                  APIs
                                                  • _memset.LIBCMT ref: 0060716A
                                                  • CreateMenu.USER32 ref: 00607185
                                                  • SetMenu.USER32(?,00000000), ref: 00607194
                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00607221
                                                  • IsMenu.USER32(?), ref: 00607237
                                                  • CreatePopupMenu.USER32 ref: 00607241
                                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0060726E
                                                  • DrawMenuBar.USER32 ref: 00607276
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                  • String ID: 0$F
                                                  • API String ID: 176399719-3044882817
                                                  • Opcode ID: 33586b981b1aa340aa80b45106f4c1146575cb1356778759816fff88475c9c50
                                                  • Instruction ID: d7598201d8b703918a7ac6cfe3e140702f08189692197ef068cdbe911a6c3011
                                                  • Opcode Fuzzy Hash: 33586b981b1aa340aa80b45106f4c1146575cb1356778759816fff88475c9c50
                                                  • Instruction Fuzzy Hash: 6C415978A41209EFDB24DF64D884EDA7BB6FF49310F144029F945A73A1D771AA10CF90
                                                  APIs
                                                  • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0060755E
                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00607565
                                                  • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00607578
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00607580
                                                  • GetPixel.GDI32(00000000,00000000,00000000), ref: 0060758B
                                                  • DeleteDC.GDI32(00000000), ref: 00607594
                                                  • GetWindowLongW.USER32(?,000000EC), ref: 0060759E
                                                  • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 006075B2
                                                  • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 006075BE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                  • String ID: static
                                                  • API String ID: 2559357485-2160076837
                                                  • Opcode ID: 5a057a6a0dd823f67f2f0b629141a0103200ae3bf7a17925d5087ea35916d11e
                                                  • Instruction ID: 6671b9caa81851325e956d196860811d5ce06ea5c0bedb1cdb2baa498a81f6e4
                                                  • Opcode Fuzzy Hash: 5a057a6a0dd823f67f2f0b629141a0103200ae3bf7a17925d5087ea35916d11e
                                                  • Instruction Fuzzy Hash: FE319C32584215BBDF269F64DC08FDB3B6AFF09321F115224FA15A21E0CB71E821DBA4
                                                  APIs
                                                  • _memset.LIBCMT ref: 005A6E3E
                                                    • Part of subcall function 005A8B28: __getptd_noexit.LIBCMT ref: 005A8B28
                                                  • __gmtime64_s.LIBCMT ref: 005A6ED7
                                                  • __gmtime64_s.LIBCMT ref: 005A6F0D
                                                  • __gmtime64_s.LIBCMT ref: 005A6F2A
                                                  • __allrem.LIBCMT ref: 005A6F80
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005A6F9C
                                                  • __allrem.LIBCMT ref: 005A6FB3
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005A6FD1
                                                  • __allrem.LIBCMT ref: 005A6FE8
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005A7006
                                                  • __invoke_watson.LIBCMT ref: 005A7077
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                  • String ID:
                                                  • API String ID: 384356119-0
                                                  • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                  • Instruction ID: 32bd48cc605b89445f46b9f39f90e2ce07cf3d387e15aebee43b3192caeb5fa9
                                                  • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                  • Instruction Fuzzy Hash: 4971E876A00717ABD7149F78DC45BAFBFA8BF46720F144629F514E6281E770E9008BD0
                                                  APIs
                                                  • _memset.LIBCMT ref: 005E2542
                                                  • GetMenuItemInfoW.USER32(00645890,000000FF,00000000,00000030), ref: 005E25A3
                                                  • SetMenuItemInfoW.USER32(00645890,00000004,00000000,00000030), ref: 005E25D9
                                                  • Sleep.KERNEL32(000001F4), ref: 005E25EB
                                                  • GetMenuItemCount.USER32(?), ref: 005E262F
                                                  • GetMenuItemID.USER32(?,00000000), ref: 005E264B
                                                  • GetMenuItemID.USER32(?,-00000001), ref: 005E2675
                                                  • GetMenuItemID.USER32(?,?), ref: 005E26BA
                                                  • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 005E2700
                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 005E2714
                                                  • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 005E2735
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                  • String ID:
                                                  • API String ID: 4176008265-0
                                                  • Opcode ID: 03348da42fcd9d605bdd697e17d837dc01463f20fa187177f7cfed573034d83a
                                                  • Instruction ID: 97c99f2b957a959fc5dbdd69a0d70bb5c43ac901dfcdbac8c3b094cdb70d0f80
                                                  • Opcode Fuzzy Hash: 03348da42fcd9d605bdd697e17d837dc01463f20fa187177f7cfed573034d83a
                                                  • Instruction Fuzzy Hash: D6617D70900289AFDB29CF65CD889AF7FBDFB41304F140569E882A7255DB71AD05DB21
                                                  APIs
                                                  • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00606FA5
                                                  • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00606FA8
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00606FCC
                                                  • _memset.LIBCMT ref: 00606FDD
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00606FEF
                                                  • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00607067
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$LongWindow_memset
                                                  • String ID:
                                                  • API String ID: 830647256-0
                                                  • Opcode ID: d0dfd3dd81102c91dbe5a9bcd94217e1ab1a150735c88280caec87f628d8d26b
                                                  • Instruction ID: 60eb53b9b0cab9bbc809c8b3f376d6d1c6330f163617a834add43944bd8a8268
                                                  • Opcode Fuzzy Hash: d0dfd3dd81102c91dbe5a9bcd94217e1ab1a150735c88280caec87f628d8d26b
                                                  • Instruction Fuzzy Hash: 6A618A75940208AFDB11DFA4CC81EEE77BAEB09700F140199FA15AB3E2C771AD51DBA0
                                                  APIs
                                                  • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 005D6BBF
                                                  • SafeArrayAllocData.OLEAUT32(?), ref: 005D6C18
                                                  • VariantInit.OLEAUT32(?), ref: 005D6C2A
                                                  • SafeArrayAccessData.OLEAUT32(?,?), ref: 005D6C4A
                                                  • VariantCopy.OLEAUT32(?,?), ref: 005D6C9D
                                                  • SafeArrayUnaccessData.OLEAUT32(?), ref: 005D6CB1
                                                  • VariantClear.OLEAUT32(?), ref: 005D6CC6
                                                  • SafeArrayDestroyData.OLEAUT32(?), ref: 005D6CD3
                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 005D6CDC
                                                  • VariantClear.OLEAUT32(?), ref: 005D6CEE
                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 005D6CF9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                  • String ID:
                                                  • API String ID: 2706829360-0
                                                  • Opcode ID: a945e0c1e871f64cb6fe36a499c4c19bf5dc5dc32dd1a2f76c81615dfea31cd0
                                                  • Instruction ID: 01478d38306f6c1d9331e1f9103fdd43a5d7eb9d4a573e5219a90658ca2b8e44
                                                  • Opcode Fuzzy Hash: a945e0c1e871f64cb6fe36a499c4c19bf5dc5dc32dd1a2f76c81615dfea31cd0
                                                  • Instruction Fuzzy Hash: 58411175A0021A9FDB10DF68D8489AEBFB9FF48354F008066E955E7361DB31AD46CF90
                                                  APIs
                                                    • Part of subcall function 00589837: __itow.LIBCMT ref: 00589862
                                                    • Part of subcall function 00589837: __swprintf.LIBCMT ref: 005898AC
                                                  • CoInitialize.OLE32 ref: 005F8403
                                                  • CoUninitialize.OLE32 ref: 005F840E
                                                  • CoCreateInstance.OLE32(?,00000000,00000017,00612BEC,?), ref: 005F846E
                                                  • IIDFromString.OLE32(?,?), ref: 005F84E1
                                                  • VariantInit.OLEAUT32(?), ref: 005F857B
                                                  • VariantClear.OLEAUT32(?), ref: 005F85DC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                  • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                  • API String ID: 834269672-1287834457
                                                  • Opcode ID: 94f066fe586d072e37da6ce7851dd1ed28172a07c1a0b57e0962193a38be16ad
                                                  • Instruction ID: 0b2921d8ee0073d414f4476ad1d13643b2dae327336ad997c1d7eef0a5b2054d
                                                  • Opcode Fuzzy Hash: 94f066fe586d072e37da6ce7851dd1ed28172a07c1a0b57e0962193a38be16ad
                                                  • Instruction Fuzzy Hash: 04619E70608716AFC710DF54C848B7EBBE9BF89754F044819FA819B291DB74ED44CB92
                                                  APIs
                                                  • WSAStartup.WSOCK32(00000101,?), ref: 005F5793
                                                  • inet_addr.WSOCK32(?), ref: 005F57D8
                                                  • gethostbyname.WSOCK32(?), ref: 005F57E4
                                                  • IcmpCreateFile.IPHLPAPI ref: 005F57F2
                                                  • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 005F5862
                                                  • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 005F5878
                                                  • IcmpCloseHandle.IPHLPAPI(00000000), ref: 005F58ED
                                                  • WSACleanup.WSOCK32 ref: 005F58F3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                  • String ID: Ping
                                                  • API String ID: 1028309954-2246546115
                                                  • Opcode ID: 36221b8c5c6e9c05f62271a8d855096b7d4cdc996c6ba2273e567bbd7f7ea6af
                                                  • Instruction ID: bc0831bf2d725e13efb320d81e5bf1cf4d45790227f9128ac54a99b735de2361
                                                  • Opcode Fuzzy Hash: 36221b8c5c6e9c05f62271a8d855096b7d4cdc996c6ba2273e567bbd7f7ea6af
                                                  • Instruction Fuzzy Hash: 51517D316047019FD720AF24DC49B6A7BE4FF49750F144969FA56EB2A1EB74E800DB42
                                                  APIs
                                                  • SetErrorMode.KERNEL32(00000001), ref: 005EB4D0
                                                  • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 005EB546
                                                  • GetLastError.KERNEL32 ref: 005EB550
                                                  • SetErrorMode.KERNEL32(00000000,READY), ref: 005EB5BD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Error$Mode$DiskFreeLastSpace
                                                  • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                  • API String ID: 4194297153-14809454
                                                  • Opcode ID: e42818801d85ee360221e339152cba671f8bc7c0f78725e2ad90979fdd99b95c
                                                  • Instruction ID: 15e2917eb6debc81f5b8d129611e13aa898a46cd8e74448007903222d61693c6
                                                  • Opcode Fuzzy Hash: e42818801d85ee360221e339152cba671f8bc7c0f78725e2ad90979fdd99b95c
                                                  • Instruction Fuzzy Hash: 7E31A335A0024ADFDB14EB69C889ABFBFB4FF49311F144066F941A7291EB709A41CB80
                                                  APIs
                                                    • Part of subcall function 00587DE1: _memmove.LIBCMT ref: 00587E22
                                                    • Part of subcall function 005DAA99: GetClassNameW.USER32(?,?,000000FF), ref: 005DAABC
                                                  • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 005D9014
                                                  • GetDlgCtrlID.USER32 ref: 005D901F
                                                  • GetParent.USER32 ref: 005D903B
                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 005D903E
                                                  • GetDlgCtrlID.USER32(?), ref: 005D9047
                                                  • GetParent.USER32(?), ref: 005D9063
                                                  • SendMessageW.USER32(00000000,?,?,00000111), ref: 005D9066
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 1536045017-1403004172
                                                  • Opcode ID: 303f7e310124f7a60c168d8cbd9d1541dc1a836d6ea6067e3f42d374ddc121dd
                                                  • Instruction ID: 549777adbb5ba5f8ef361394a31f9b243a10f8c2b0fba459dc8e8d24c5b2f8b8
                                                  • Opcode Fuzzy Hash: 303f7e310124f7a60c168d8cbd9d1541dc1a836d6ea6067e3f42d374ddc121dd
                                                  • Instruction Fuzzy Hash: 3D21C474A00109BBDF24ABA4CC89EFEBB75FF89310F104216F961972A1DB759815DB20
                                                  APIs
                                                    • Part of subcall function 00587DE1: _memmove.LIBCMT ref: 00587E22
                                                    • Part of subcall function 005DAA99: GetClassNameW.USER32(?,?,000000FF), ref: 005DAABC
                                                  • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 005D90FD
                                                  • GetDlgCtrlID.USER32 ref: 005D9108
                                                  • GetParent.USER32 ref: 005D9124
                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 005D9127
                                                  • GetDlgCtrlID.USER32(?), ref: 005D9130
                                                  • GetParent.USER32(?), ref: 005D914C
                                                  • SendMessageW.USER32(00000000,?,?,00000111), ref: 005D914F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 1536045017-1403004172
                                                  • Opcode ID: 1f7ae6e2577243a8940b5d99237a952d320c6c4a7b7ad2652653ef8e12fdc844
                                                  • Instruction ID: a261ef130212c68d952a552d746c2b93df44929de2548cf45e0224c4d3ca65f5
                                                  • Opcode Fuzzy Hash: 1f7ae6e2577243a8940b5d99237a952d320c6c4a7b7ad2652653ef8e12fdc844
                                                  • Instruction Fuzzy Hash: D921C174A40109BBDF20ABA4CC89EFEBB75FF49300F100117B951A72A1DB758819DB20
                                                  APIs
                                                  • GetParent.USER32 ref: 005D916F
                                                  • GetClassNameW.USER32(00000000,?,00000100), ref: 005D9184
                                                  • _wcscmp.LIBCMT ref: 005D9196
                                                  • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 005D9211
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ClassMessageNameParentSend_wcscmp
                                                  • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                  • API String ID: 1704125052-3381328864
                                                  • Opcode ID: d3060e5f753e4b5d5f5779bcadf3af20b40043d015238835785f7e585e9ee8f0
                                                  • Instruction ID: 70a708e8d31498355339a04469d397ddd06ca8c89de690b92025f14a81bb7b53
                                                  • Opcode Fuzzy Hash: d3060e5f753e4b5d5f5779bcadf3af20b40043d015238835785f7e585e9ee8f0
                                                  • Instruction Fuzzy Hash: A2110D7A28C30775FA31262CDC0BEBB3F9DBB16720F200517F904E55D1EE5198519594
                                                  APIs
                                                  • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 005E7A6C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ArraySafeVartype
                                                  • String ID:
                                                  • API String ID: 1725837607-0
                                                  • Opcode ID: c433e41b03c6aa14ddb11da110502e8a5f58975d0abe288039ced132ee5d6c0e
                                                  • Instruction ID: ea210cf469e7d1b352d98b20e83b5a3a0236f4911c4ebee4af221faa4b80240f
                                                  • Opcode Fuzzy Hash: c433e41b03c6aa14ddb11da110502e8a5f58975d0abe288039ced132ee5d6c0e
                                                  • Instruction Fuzzy Hash: 2FB19D7190424A9FDB14DFA5C885BBEBBB9FF4D320F240469EA85E7281D734AD41CB90
                                                  APIs
                                                  • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 0058FAA6
                                                  • OleUninitialize.OLE32(?,00000000), ref: 0058FB45
                                                  • UnregisterHotKey.USER32(?), ref: 0058FC9C
                                                  • DestroyWindow.USER32(?), ref: 005C45D6
                                                  • FreeLibrary.KERNEL32(?), ref: 005C463B
                                                  • VirtualFree.KERNEL32(?,00000000,00008000), ref: 005C4668
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                  • String ID: close all
                                                  • API String ID: 469580280-3243417748
                                                  • Opcode ID: bb063b05da25a92a8778e6f55b45c945eafba75e048a12d5d132c2e360fab409
                                                  • Instruction ID: 3d257e330288402e30dc90943d9647f372a100a324feca64396b13dbe5f1001f
                                                  • Opcode Fuzzy Hash: bb063b05da25a92a8778e6f55b45c945eafba75e048a12d5d132c2e360fab409
                                                  • Instruction Fuzzy Hash: 5EA16C34701212CFCB29EF54C5A9F69FB64BF45710F5442ADE80AAB261DB30AD56CF90
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Variant$ClearInit$_memset
                                                  • String ID: ,,a$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                  • API String ID: 2862541840-2453478946
                                                  • Opcode ID: 0fe9a3d7d2859263bfa0e7aff942fcdafdfc4492a525f37cbf6fe1d21253a9f6
                                                  • Instruction ID: c540e554b89c05bd8eba9a1a501593e5d65163ce4b46b2360d4020331d33e6bc
                                                  • Opcode Fuzzy Hash: 0fe9a3d7d2859263bfa0e7aff942fcdafdfc4492a525f37cbf6fe1d21253a9f6
                                                  • Instruction Fuzzy Hash: 03919F71E00619ABDF24DFA5C848FAEBBB9FF85710F108959F605AB280D7749941CBA0
                                                  APIs
                                                  • EnumChildWindows.USER32(?,005DA439), ref: 005DA377
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ChildEnumWindows
                                                  • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                  • API String ID: 3555792229-1603158881
                                                  • Opcode ID: e8f97b6f668058159ec306274ddf9f9a58540039723030c248b7cd87fbb30d10
                                                  • Instruction ID: b24f93fa5f700fb0ecd4fafd5d7c09746e6fc3b9f4bcbcbe1c3e993c75cb6480
                                                  • Opcode Fuzzy Hash: e8f97b6f668058159ec306274ddf9f9a58540039723030c248b7cd87fbb30d10
                                                  • Instruction Fuzzy Hash: 6F91C530900606AACB28EFA8C445BEEFF75BF45300F54851BE859A7381DB31A999DBD1
                                                  APIs
                                                  • SetWindowLongW.USER32(?,000000EB), ref: 00582EAE
                                                    • Part of subcall function 00581DB3: GetClientRect.USER32(?,?), ref: 00581DDC
                                                    • Part of subcall function 00581DB3: GetWindowRect.USER32(?,?), ref: 00581E1D
                                                    • Part of subcall function 00581DB3: ScreenToClient.USER32(?,?), ref: 00581E45
                                                  • GetDC.USER32 ref: 005BCD32
                                                  • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 005BCD45
                                                  • SelectObject.GDI32(00000000,00000000), ref: 005BCD53
                                                  • SelectObject.GDI32(00000000,00000000), ref: 005BCD68
                                                  • ReleaseDC.USER32(?,00000000), ref: 005BCD70
                                                  • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 005BCDFB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                  • String ID: U
                                                  • API String ID: 4009187628-3372436214
                                                  • Opcode ID: efc72738fd1e89b4f3b199508058785b8cc0896047811d880c2b5a3f15e69d16
                                                  • Instruction ID: 0929465c7aeda9a59aa3dc6817a65e08613f09798c88808741df0584270b39bd
                                                  • Opcode Fuzzy Hash: efc72738fd1e89b4f3b199508058785b8cc0896047811d880c2b5a3f15e69d16
                                                  • Instruction Fuzzy Hash: BB71D135500205DFCF219F64C884AFA7FBAFF49320F14467AED566A2A6C731AC81DB64
                                                  APIs
                                                  • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 005F1A50
                                                  • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 005F1A7C
                                                  • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 005F1ABE
                                                  • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 005F1AD3
                                                  • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 005F1AE0
                                                  • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 005F1B10
                                                  • InternetCloseHandle.WININET(00000000), ref: 005F1B57
                                                    • Part of subcall function 005F2483: GetLastError.KERNEL32(?,?,005F1817,00000000,00000000,00000001), ref: 005F2498
                                                    • Part of subcall function 005F2483: SetEvent.KERNEL32(?,?,005F1817,00000000,00000000,00000001), ref: 005F24AD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                  • String ID:
                                                  • API String ID: 2603140658-3916222277
                                                  • Opcode ID: 503a24b5273430c2721a9184d8bcff977381d68e9e2c1535e4b6b1c45888478c
                                                  • Instruction ID: b80adb34b9ad0fe719482331a0867041fa525886e5c7e4b0090921ee17271066
                                                  • Opcode Fuzzy Hash: 503a24b5273430c2721a9184d8bcff977381d68e9e2c1535e4b6b1c45888478c
                                                  • Instruction Fuzzy Hash: 23417CB1541619FFEB118F50CC89FBB7BADFF08354F00412AFA059A141EBB99E448BA5
                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0060F910), ref: 005F8D28
                                                  • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0060F910), ref: 005F8D5C
                                                  • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 005F8ED6
                                                  • SysFreeString.OLEAUT32(?), ref: 005F8F00
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                  • String ID:
                                                  • API String ID: 560350794-0
                                                  • Opcode ID: 420d08b61335dad147efeed6ea95005a29d58500b022f1ec565fddfed3a30859
                                                  • Instruction ID: 210d46d1f100de09c4f4fba789fa712ebd9573d33f9287ad919418ca1e9ef745
                                                  • Opcode Fuzzy Hash: 420d08b61335dad147efeed6ea95005a29d58500b022f1ec565fddfed3a30859
                                                  • Instruction Fuzzy Hash: 25F11971A00109AFDF14DF94C888EBEBBB9FF85314F148498FA15AB251DB35AE45CB50
                                                  APIs
                                                  • _memset.LIBCMT ref: 005FF6B5
                                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 005FF848
                                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 005FF86C
                                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 005FF8AC
                                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 005FF8CE
                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 005FFA4A
                                                  • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 005FFA7C
                                                  • CloseHandle.KERNEL32(?), ref: 005FFAAB
                                                  • CloseHandle.KERNEL32(?), ref: 005FFB22
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                  • String ID:
                                                  • API String ID: 4090791747-0
                                                  • Opcode ID: dda902eefebb15bcfba754d8dc3c66591f16da1efdc648d5ba85460e26bf59d6
                                                  • Instruction ID: e92e481a1621a2cb0e96203f309b5b5bc5d8bd34e2bef7a38ebf6f04bbb1838a
                                                  • Opcode Fuzzy Hash: dda902eefebb15bcfba754d8dc3c66591f16da1efdc648d5ba85460e26bf59d6
                                                  • Instruction Fuzzy Hash: A4E19F316042069FCB14EF24C885A6EBFE1BF85354F18896DF9959B6A1CB34EC41CB52
                                                  APIs
                                                    • Part of subcall function 005E466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,005E3697,?), ref: 005E468B
                                                    • Part of subcall function 005E466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,005E3697,?), ref: 005E46A4
                                                    • Part of subcall function 005E4A31: GetFileAttributesW.KERNEL32(?,005E370B), ref: 005E4A32
                                                  • lstrcmpiW.KERNEL32(?,?), ref: 005E4D40
                                                  • _wcscmp.LIBCMT ref: 005E4D5A
                                                  • MoveFileW.KERNEL32(?,?), ref: 005E4D75
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                  • String ID:
                                                  • API String ID: 793581249-0
                                                  • Opcode ID: 28633e555d21baad58b006e8c1b6b475e239708c35c194d217c16728d9863c42
                                                  • Instruction ID: 270183136ab303bdd3ee3ad9c9eb457d03b9f8ea5087d4735575c7c1dfc30531
                                                  • Opcode Fuzzy Hash: 28633e555d21baad58b006e8c1b6b475e239708c35c194d217c16728d9863c42
                                                  • Instruction Fuzzy Hash: 885141B24083859BC724EB65D8859DF7BECBF85350F50092EB6C5D3151EE30A688CB66
                                                  APIs
                                                  • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 006086FF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: InvalidateRect
                                                  • String ID:
                                                  • API String ID: 634782764-0
                                                  • Opcode ID: a437222eda9726115bee409eface6e3a27e116350b7b1f02f625798bcc33c812
                                                  • Instruction ID: 715eb7f5fff1effa76184127ef42d3a7c19ac96554d481da29a3248512920930
                                                  • Opcode Fuzzy Hash: a437222eda9726115bee409eface6e3a27e116350b7b1f02f625798bcc33c812
                                                  • Instruction Fuzzy Hash: 9C51A134590214BFDB28DB248C89FAF7BA7BB05724F604125F991E72E1CF72A990CB41
                                                  APIs
                                                  • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 005BC2F7
                                                  • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 005BC319
                                                  • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 005BC331
                                                  • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 005BC34F
                                                  • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 005BC370
                                                  • DestroyIcon.USER32(00000000), ref: 005BC37F
                                                  • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 005BC39C
                                                  • DestroyIcon.USER32(?), ref: 005BC3AB
                                                    • Part of subcall function 0060A4AF: DeleteObject.GDI32(00000000), ref: 0060A4E8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                  • String ID:
                                                  • API String ID: 2819616528-0
                                                  • Opcode ID: 323eb1db9b7aaf2f7e96d3b182c5c2a7e45d0f5f37aeb537a43e64410e36528a
                                                  • Instruction ID: e84389b250252599dd1fae8ee18093432823b811dd678e4872804a43e9309a70
                                                  • Opcode Fuzzy Hash: 323eb1db9b7aaf2f7e96d3b182c5c2a7e45d0f5f37aeb537a43e64410e36528a
                                                  • Instruction Fuzzy Hash: 9E515874A00209AFDB24EF65CC45BAA7FE6FB58311F104928F952E72A0DB70AD90DB50
                                                  APIs
                                                    • Part of subcall function 005DA82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 005DA84C
                                                    • Part of subcall function 005DA82C: GetCurrentThreadId.KERNEL32 ref: 005DA853
                                                    • Part of subcall function 005DA82C: AttachThreadInput.USER32(00000000,?,005D9683,?,00000001), ref: 005DA85A
                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 005D968E
                                                  • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 005D96AB
                                                  • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 005D96AE
                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 005D96B7
                                                  • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 005D96D5
                                                  • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 005D96D8
                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 005D96E1
                                                  • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 005D96F8
                                                  • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 005D96FB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                  • String ID:
                                                  • API String ID: 2014098862-0
                                                  • Opcode ID: 9b89be4331de77b6a12dd6853d8865118afa59f09559858398eaeec7c8e69c4e
                                                  • Instruction ID: c5c6acb14d0a9eb9405a57233c9a381a9351f0b79524582a275b5a9de1dc2304
                                                  • Opcode Fuzzy Hash: 9b89be4331de77b6a12dd6853d8865118afa59f09559858398eaeec7c8e69c4e
                                                  • Instruction Fuzzy Hash: 6A11CEB1990218BEF7206B64DC89F6B3E2EEB4C750F101426F644AB1A0C9F35C10DAE4
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,005D853C,00000B00,?,?), ref: 005D892A
                                                  • HeapAlloc.KERNEL32(00000000,?,005D853C,00000B00,?,?), ref: 005D8931
                                                  • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,005D853C,00000B00,?,?), ref: 005D8946
                                                  • GetCurrentProcess.KERNEL32(?,00000000,?,005D853C,00000B00,?,?), ref: 005D894E
                                                  • DuplicateHandle.KERNEL32(00000000,?,005D853C,00000B00,?,?), ref: 005D8951
                                                  • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,005D853C,00000B00,?,?), ref: 005D8961
                                                  • GetCurrentProcess.KERNEL32(005D853C,00000000,?,005D853C,00000B00,?,?), ref: 005D8969
                                                  • DuplicateHandle.KERNEL32(00000000,?,005D853C,00000B00,?,?), ref: 005D896C
                                                  • CreateThread.KERNEL32(00000000,00000000,005D8992,00000000,00000000,00000000), ref: 005D8986
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                  • String ID:
                                                  • API String ID: 1957940570-0
                                                  • Opcode ID: ee3d36abdeac26a24d3403ad022b50af02e06f7dbca736586aeb0a6603564f64
                                                  • Instruction ID: f4b6cc0f78fda60e939b5785014ff448cbad288f3db4aca72335dec1b66c43a2
                                                  • Opcode Fuzzy Hash: ee3d36abdeac26a24d3403ad022b50af02e06f7dbca736586aeb0a6603564f64
                                                  • Instruction Fuzzy Hash: 7601BF75280304FFE720EBA5DC4DF673B6DEB89711F405461FA05DB591CA709800CB20
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: NULL Pointer assignment$Not an Object type
                                                  • API String ID: 0-572801152
                                                  • Opcode ID: 59946fffea58030e9b0785a3ea9ba0d3fa06075f246cd3f25b63af6d033c6980
                                                  • Instruction ID: ce9a6a6318ce44135bbd583599ba50c7b9a046bfc4af6e2daf8c755da02063f9
                                                  • Opcode Fuzzy Hash: 59946fffea58030e9b0785a3ea9ba0d3fa06075f246cd3f25b63af6d033c6980
                                                  • Instruction Fuzzy Hash: 99C19371A0060E9BDF10DF98C884BBEBBF9BB48314F148469EA05A7281E7749D45CB90
                                                  APIs
                                                    • Part of subcall function 005D710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,005D7044,80070057,?,?,?,005D7455), ref: 005D7127
                                                    • Part of subcall function 005D710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,005D7044,80070057,?,?), ref: 005D7142
                                                    • Part of subcall function 005D710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,005D7044,80070057,?,?), ref: 005D7150
                                                    • Part of subcall function 005D710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,005D7044,80070057,?), ref: 005D7160
                                                  • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 005F9806
                                                  • _memset.LIBCMT ref: 005F9813
                                                  • _memset.LIBCMT ref: 005F9956
                                                  • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 005F9982
                                                  • CoTaskMemFree.OLE32(?), ref: 005F998D
                                                  Strings
                                                  • NULL Pointer assignment, xrefs: 005F99DB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                  • String ID: NULL Pointer assignment
                                                  • API String ID: 1300414916-2785691316
                                                  • Opcode ID: 10d200e9a3de38819f85c277805f3e4c8efc384e1e91ce16fadd57cd6846d9d6
                                                  • Instruction ID: 0037a1a799cb816bcf5dc88f1c2077a0cce2b6d10f0df3a391b8d23e55a674d9
                                                  • Opcode Fuzzy Hash: 10d200e9a3de38819f85c277805f3e4c8efc384e1e91ce16fadd57cd6846d9d6
                                                  • Instruction Fuzzy Hash: C7911771D0021DEBDB10EFA5DC45AEEBBB9BF48310F20415AF519A7291EB719A44CFA0
                                                  APIs
                                                  • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00606E24
                                                  • SendMessageW.USER32(?,00001036,00000000,?), ref: 00606E38
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00606E52
                                                  • _wcscat.LIBCMT ref: 00606EAD
                                                  • SendMessageW.USER32(?,00001057,00000000,?), ref: 00606EC4
                                                  • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00606EF2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window_wcscat
                                                  • String ID: SysListView32
                                                  • API String ID: 307300125-78025650
                                                  • Opcode ID: a6e11948ad52d2dd974c46ffb35e13e0ec1feeae677ecb67c965deb56a47ebac
                                                  • Instruction ID: 4771ef26d4887d01c83b5445fecb6fd816eef7113bd2d3cbb8ba912428e42fd7
                                                  • Opcode Fuzzy Hash: a6e11948ad52d2dd974c46ffb35e13e0ec1feeae677ecb67c965deb56a47ebac
                                                  • Instruction Fuzzy Hash: 9341B270A80349ABEB25DF64CC85BEF77EAEF08350F10042AF585E72D1D6729D958B60
                                                  APIs
                                                    • Part of subcall function 005E3C55: CreateToolhelp32Snapshot.KERNEL32 ref: 005E3C7A
                                                    • Part of subcall function 005E3C55: Process32FirstW.KERNEL32(00000000,?), ref: 005E3C88
                                                    • Part of subcall function 005E3C55: CloseHandle.KERNEL32(00000000), ref: 005E3D52
                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 005FE9A4
                                                  • GetLastError.KERNEL32 ref: 005FE9B7
                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 005FE9E6
                                                  • TerminateProcess.KERNEL32(00000000,00000000), ref: 005FEA63
                                                  • GetLastError.KERNEL32(00000000), ref: 005FEA6E
                                                  • CloseHandle.KERNEL32(00000000), ref: 005FEAA3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                  • String ID: SeDebugPrivilege
                                                  • API String ID: 2533919879-2896544425
                                                  • Opcode ID: 381aa8ccdc6f196b655ebb2852d795587d7144afe70210f75eb51d318beb8911
                                                  • Instruction ID: fcff41c3fcf9217dab1f43defe1c34a00f53ce713938254279d8632f6cb6f74b
                                                  • Opcode Fuzzy Hash: 381aa8ccdc6f196b655ebb2852d795587d7144afe70210f75eb51d318beb8911
                                                  • Instruction Fuzzy Hash: 1D41AD712002069FDB24EF14CC9AF7EBBA5BF84314F188459FA429B3D2CB75A845CB91
                                                  APIs
                                                  • LoadIconW.USER32(00000000,00007F03), ref: 005E3033
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: IconLoad
                                                  • String ID: blank$info$question$stop$warning
                                                  • API String ID: 2457776203-404129466
                                                  • Opcode ID: b27ce1353c5671bdfd8137baad18185f94ba16eb17ae48914683cfa879f959bc
                                                  • Instruction ID: 6735b9e6bc682c7d340e67aa7eb0132cd84b7af74cedbf7c3642f7b50c0d5774
                                                  • Opcode Fuzzy Hash: b27ce1353c5671bdfd8137baad18185f94ba16eb17ae48914683cfa879f959bc
                                                  • Instruction Fuzzy Hash: 0111C6312483C6BED7299A59DC4EDBF6F9CBF15370F10042AF940A7181DA619F4055A5
                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 005E4312
                                                  • LoadStringW.USER32(00000000), ref: 005E4319
                                                  • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 005E432F
                                                  • LoadStringW.USER32(00000000), ref: 005E4336
                                                  • _wprintf.LIBCMT ref: 005E435C
                                                  • MessageBoxW.USER32(00000000,?,?,00011010), ref: 005E437A
                                                  Strings
                                                  • %s (%d) : ==> %s: %s %s, xrefs: 005E4357
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: HandleLoadModuleString$Message_wprintf
                                                  • String ID: %s (%d) : ==> %s: %s %s
                                                  • API String ID: 3648134473-3128320259
                                                  • Opcode ID: 4f818e44fa14b46c8f9c3bfbc3fb83aee5dc7529dabf576e80ee02153a547acb
                                                  • Instruction ID: f51f1bb75a40127573b876c3dbf74a1445dd3b333c45bd07ce0c531e3789d3fb
                                                  • Opcode Fuzzy Hash: 4f818e44fa14b46c8f9c3bfbc3fb83aee5dc7529dabf576e80ee02153a547acb
                                                  • Instruction Fuzzy Hash: E40162F2940208BFE721DBA0DD89EEB776DEB08300F0009A1B745E2051EA755E854B70
                                                  APIs
                                                    • Part of subcall function 00582612: GetWindowLongW.USER32(?,000000EB), ref: 00582623
                                                  • GetSystemMetrics.USER32(0000000F), ref: 0060D47C
                                                  • GetSystemMetrics.USER32(0000000F), ref: 0060D49C
                                                  • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0060D6D7
                                                  • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0060D6F5
                                                  • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0060D716
                                                  • ShowWindow.USER32(00000003,00000000), ref: 0060D735
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 0060D75A
                                                  • DefDlgProcW.USER32(?,00000005,?,?), ref: 0060D77D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                  • String ID:
                                                  • API String ID: 1211466189-0
                                                  • Opcode ID: cf8ec3f4b304f7ddd5069792384882d5542bc9189693c7544cfef0b7380495c4
                                                  • Instruction ID: bce696d6b78092d371f2d3b13080b0be8801dc5ca42cc1e41d279b7f64d29928
                                                  • Opcode Fuzzy Hash: cf8ec3f4b304f7ddd5069792384882d5542bc9189693c7544cfef0b7380495c4
                                                  • Instruction Fuzzy Hash: D0B19B75640225EFDF18CFA8C9857EE7BB2FF04701F088269EC489B295D775A950CB90
                                                  APIs
                                                  • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,005BC1C7,00000004,00000000,00000000,00000000), ref: 00582ACF
                                                  • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,005BC1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00582B17
                                                  • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,005BC1C7,00000004,00000000,00000000,00000000), ref: 005BC21A
                                                  • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,005BC1C7,00000004,00000000,00000000,00000000), ref: 005BC286
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ShowWindow
                                                  • String ID:
                                                  • API String ID: 1268545403-0
                                                  • Opcode ID: 23ac18e68d1f008be5629d2aff11cfe99e01c401a2e1c5bb11336784d9044a58
                                                  • Instruction ID: 71fb14e49661b1c16d9affb8428935b9cb1b1d810def8d91798da8e4a45e7908
                                                  • Opcode Fuzzy Hash: 23ac18e68d1f008be5629d2aff11cfe99e01c401a2e1c5bb11336784d9044a58
                                                  • Instruction Fuzzy Hash: A441E934608680ABD73DAB28DC8CB6B7F92BF85310F18881DE8D7A6561C6B1A841D711
                                                  APIs
                                                  • InterlockedExchange.KERNEL32(?,000001F5), ref: 005E70DD
                                                    • Part of subcall function 005A0DB6: std::exception::exception.LIBCMT ref: 005A0DEC
                                                    • Part of subcall function 005A0DB6: __CxxThrowException@8.LIBCMT ref: 005A0E01
                                                  • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 005E7114
                                                  • EnterCriticalSection.KERNEL32(?), ref: 005E7130
                                                  • _memmove.LIBCMT ref: 005E717E
                                                  • _memmove.LIBCMT ref: 005E719B
                                                  • LeaveCriticalSection.KERNEL32(?), ref: 005E71AA
                                                  • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 005E71BF
                                                  • InterlockedExchange.KERNEL32(?,000001F6), ref: 005E71DE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                  • String ID:
                                                  • API String ID: 256516436-0
                                                  • Opcode ID: 507075fff4296ff2a647655c641d9281fb081b63afaeee9d7056c06b75189704
                                                  • Instruction ID: 8a0c78798cdfd35c5728a4898fc6a5643e2807a4159ebf9e5b85fbf796e2d538
                                                  • Opcode Fuzzy Hash: 507075fff4296ff2a647655c641d9281fb081b63afaeee9d7056c06b75189704
                                                  • Instruction Fuzzy Hash: B9317231900205EBCF14EFA5DC899AF7B79FF89310F1441A5F9049B246D7709E10DBA0
                                                  APIs
                                                  • DeleteObject.GDI32(00000000), ref: 006061EB
                                                  • GetDC.USER32(00000000), ref: 006061F3
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 006061FE
                                                  • ReleaseDC.USER32(00000000,00000000), ref: 0060620A
                                                  • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00606246
                                                  • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00606257
                                                  • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0060902A,?,?,000000FF,00000000,?,000000FF,?), ref: 00606291
                                                  • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 006062B1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                  • String ID:
                                                  • API String ID: 3864802216-0
                                                  • Opcode ID: 41de9133b886694a7e75fc57333c8058bbba1de540ca1bf183d97c17c0a93165
                                                  • Instruction ID: eacb54aa866d985b7e0d25bc0bd3eca8e3c17711de40031b6b7edc5700cc67b4
                                                  • Opcode Fuzzy Hash: 41de9133b886694a7e75fc57333c8058bbba1de540ca1bf183d97c17c0a93165
                                                  • Instruction Fuzzy Hash: CE318072181210BFEF258F50CC8AFEB3BAAEF49765F044065FE089A291C6B59C51CB74
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _memcmp
                                                  • String ID:
                                                  • API String ID: 2931989736-0
                                                  • Opcode ID: c9a79d1083390feb5866b41873ad8e9c2f772f39e210a7aba11cf25c5e2d17ce
                                                  • Instruction ID: 77d3015af09db747787ebb7e6c4f29e35e4d3c855861374235c6b7acbf07eb61
                                                  • Opcode Fuzzy Hash: c9a79d1083390feb5866b41873ad8e9c2f772f39e210a7aba11cf25c5e2d17ce
                                                  • Instruction Fuzzy Hash: CC21BD61601607ABBA2466299D52FFF7F5FBF55348F0A4023FD0596343EF24DE2082A5
                                                  APIs
                                                    • Part of subcall function 00589837: __itow.LIBCMT ref: 00589862
                                                    • Part of subcall function 00589837: __swprintf.LIBCMT ref: 005898AC
                                                    • Part of subcall function 0059FC86: _wcscpy.LIBCMT ref: 0059FCA9
                                                  • _wcstok.LIBCMT ref: 005EEC94
                                                  • _wcscpy.LIBCMT ref: 005EED23
                                                  • _memset.LIBCMT ref: 005EED56
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                  • String ID: X
                                                  • API String ID: 774024439-3081909835
                                                  • Opcode ID: 7596c9aa78aeb45fbeece06ff17611fb1f163883c125551a354aec59a9321ab8
                                                  • Instruction ID: 03a5f01ebd3ab299e445d9ec4fa5e120580436bd189138f066ebe6a82f8c5c98
                                                  • Opcode Fuzzy Hash: 7596c9aa78aeb45fbeece06ff17611fb1f163883c125551a354aec59a9321ab8
                                                  • Instruction Fuzzy Hash: FDC161715187429FC714EF24D84AA6ABBE4FF85314F14492DF899972A2DB30EC45CB82
                                                  APIs
                                                  • __WSAFDIsSet.WSOCK32(00000000,?), ref: 005F6C00
                                                  • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 005F6C21
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 005F6C34
                                                  • htons.WSOCK32(?), ref: 005F6CEA
                                                  • inet_ntoa.WSOCK32(?), ref: 005F6CA7
                                                    • Part of subcall function 005DA7E9: _strlen.LIBCMT ref: 005DA7F3
                                                    • Part of subcall function 005DA7E9: _memmove.LIBCMT ref: 005DA815
                                                  • _strlen.LIBCMT ref: 005F6D44
                                                  • _memmove.LIBCMT ref: 005F6DAD
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                  • String ID:
                                                  • API String ID: 3619996494-0
                                                  • Opcode ID: 2d894287352564534877eb09c6b0168722bfd9f28e99288a52f588dd9337701e
                                                  • Instruction ID: 4ffcaae79fe5f07a2b2b4466680f48dad440415a6e3c35fd8ebad6bf0746fae0
                                                  • Opcode Fuzzy Hash: 2d894287352564534877eb09c6b0168722bfd9f28e99288a52f588dd9337701e
                                                  • Instruction Fuzzy Hash: 8481D071204205ABC710FF24CC8AE7BBBA9FFC4714F544919FA55AB292DA74ED01CB92
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 175f3ac6cbc985cd58fd8d352bf880759870e7bb4c235b7f567d053b9fc209ba
                                                  • Instruction ID: 068f380aef4a6b0f5530692f043a6b3c67d895a1409819cf2bd3359697f2c561
                                                  • Opcode Fuzzy Hash: 175f3ac6cbc985cd58fd8d352bf880759870e7bb4c235b7f567d053b9fc209ba
                                                  • Instruction Fuzzy Hash: 2D716B30900509EFDF14DF98CC49ABEBF79FF85310F148159F915AA251C770AA52CBA4
                                                  APIs
                                                  • IsWindow.USER32(00F24DC0), ref: 0060B3EB
                                                  • IsWindowEnabled.USER32(00F24DC0), ref: 0060B3F7
                                                  • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0060B4DB
                                                  • SendMessageW.USER32(00F24DC0,000000B0,?,?), ref: 0060B512
                                                  • IsDlgButtonChecked.USER32(?,?), ref: 0060B54F
                                                  • GetWindowLongW.USER32(00F24DC0,000000EC), ref: 0060B571
                                                  • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0060B589
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                  • String ID:
                                                  • API String ID: 4072528602-0
                                                  • Opcode ID: 5f0f1880890ee4d6f0aab11ae803b9d247c188b97c62257a7428f2b58a56f2d7
                                                  • Instruction ID: 84b2a4f457d44351feac3de40f3f2ac52331c036d0296b8fb5887cc0ea93f8c7
                                                  • Opcode Fuzzy Hash: 5f0f1880890ee4d6f0aab11ae803b9d247c188b97c62257a7428f2b58a56f2d7
                                                  • Instruction Fuzzy Hash: 26718F34680204AFDB299F54C894FEB7BE7EF09300F14A459FA56973E6C731AA41CB50
                                                  APIs
                                                  • _memset.LIBCMT ref: 005FF448
                                                  • _memset.LIBCMT ref: 005FF511
                                                  • ShellExecuteExW.SHELL32(?), ref: 005FF556
                                                    • Part of subcall function 00589837: __itow.LIBCMT ref: 00589862
                                                    • Part of subcall function 00589837: __swprintf.LIBCMT ref: 005898AC
                                                    • Part of subcall function 0059FC86: _wcscpy.LIBCMT ref: 0059FCA9
                                                  • GetProcessId.KERNEL32(00000000), ref: 005FF5CD
                                                  • CloseHandle.KERNEL32(00000000), ref: 005FF5FC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                  • String ID: @
                                                  • API String ID: 3522835683-2766056989
                                                  • Opcode ID: 20f5e6280a57f19c9bdb7b832af62948729ae442045b5ef26c3e863a79a5162b
                                                  • Instruction ID: 619bd960469ecc90ad891e00e7e639a85613c403f2e4fb99874be7b3a11ae1a0
                                                  • Opcode Fuzzy Hash: 20f5e6280a57f19c9bdb7b832af62948729ae442045b5ef26c3e863a79a5162b
                                                  • Instruction Fuzzy Hash: 9D618A75A0061A9FCF14EF64C8899AEBFB5FF89314F148069E816AB751CB34AD41CF90
                                                  APIs
                                                  • GetParent.USER32(?), ref: 005E0F8C
                                                  • GetKeyboardState.USER32(?), ref: 005E0FA1
                                                  • SetKeyboardState.USER32(?), ref: 005E1002
                                                  • PostMessageW.USER32(?,00000101,00000010,?), ref: 005E1030
                                                  • PostMessageW.USER32(?,00000101,00000011,?), ref: 005E104F
                                                  • PostMessageW.USER32(?,00000101,00000012,?), ref: 005E1095
                                                  • PostMessageW.USER32(?,00000101,0000005B,?), ref: 005E10B8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessagePost$KeyboardState$Parent
                                                  • String ID:
                                                  • API String ID: 87235514-0
                                                  • Opcode ID: 2eefbef56fa3239a0abf2a4269d173d8fad84473d500297679537322781fde3e
                                                  • Instruction ID: 4e72d72d3263eb60e69b392399aa129e3caa746b4cd06301a2802189b8a7072b
                                                  • Opcode Fuzzy Hash: 2eefbef56fa3239a0abf2a4269d173d8fad84473d500297679537322781fde3e
                                                  • Instruction Fuzzy Hash: 155126B0654BD63EFB3A43368C19BBABEA97B06300F088589E1D5458C3C2E9DCD8D755
                                                  APIs
                                                  • GetParent.USER32(00000000), ref: 005E0DA5
                                                  • GetKeyboardState.USER32(?), ref: 005E0DBA
                                                  • SetKeyboardState.USER32(?), ref: 005E0E1B
                                                  • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 005E0E47
                                                  • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 005E0E64
                                                  • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 005E0EA8
                                                  • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 005E0EC9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessagePost$KeyboardState$Parent
                                                  • String ID:
                                                  • API String ID: 87235514-0
                                                  • Opcode ID: 2e9d22b90b8fcab616cb4e37cc7c867e350ad446a4007eb9424572dace12af8a
                                                  • Instruction ID: a38e9d87e285c69c17ffb436d57ddc25c3d7a0b9fa708e0dd3db64973a1f67a9
                                                  • Opcode Fuzzy Hash: 2e9d22b90b8fcab616cb4e37cc7c867e350ad446a4007eb9424572dace12af8a
                                                  • Instruction Fuzzy Hash: 0B5124A05487D63DFB3A83768C45B7ABFA97B06300F089899E1D4568C2C3E5ECD8D760
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _wcsncpy$LocalTime
                                                  • String ID:
                                                  • API String ID: 2945705084-0
                                                  • Opcode ID: 5394d135aa832561bc5ad1c93cfbff1bc2629dcee81423c256e504d5c70113af
                                                  • Instruction ID: 3564738f45d6a4cc2d20ac378b2ea800d7678e85a027392966e6741b96c97017
                                                  • Opcode Fuzzy Hash: 5394d135aa832561bc5ad1c93cfbff1bc2629dcee81423c256e504d5c70113af
                                                  • Instruction Fuzzy Hash: CE41B676C1021976CB11EBF88C4A9CFBBB8BF45310F504856F544E3121FA34E255C7A6
                                                  APIs
                                                  • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 005DD5D4
                                                  • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 005DD60A
                                                  • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 005DD61B
                                                  • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 005DD69D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ErrorMode$AddressCreateInstanceProc
                                                  • String ID: ,,a$DllGetClassObject
                                                  • API String ID: 753597075-1266341603
                                                  • Opcode ID: 6b7d7c20e77ec03e93ffaa9841add01724e0082682c6cd8c9e0328136fa39870
                                                  • Instruction ID: 502139e18c34db0817e798ef946674eaaca0a1792c4346106def9b1a514b122c
                                                  • Opcode Fuzzy Hash: 6b7d7c20e77ec03e93ffaa9841add01724e0082682c6cd8c9e0328136fa39870
                                                  • Instruction Fuzzy Hash: 4F4159B1600205EFDB25CF68C884A9ABFBAFF44310F1581ABA9099F305D7B1D944DBE0
                                                  APIs
                                                    • Part of subcall function 005E466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,005E3697,?), ref: 005E468B
                                                    • Part of subcall function 005E466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,005E3697,?), ref: 005E46A4
                                                  • lstrcmpiW.KERNEL32(?,?), ref: 005E36B7
                                                  • _wcscmp.LIBCMT ref: 005E36D3
                                                  • MoveFileW.KERNEL32(?,?), ref: 005E36EB
                                                  • _wcscat.LIBCMT ref: 005E3733
                                                  • SHFileOperationW.SHELL32(?), ref: 005E379F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                  • String ID: \*.*
                                                  • API String ID: 1377345388-1173974218
                                                  • Opcode ID: c1e84ea231f73048ff1c9685da0b536c4a350b1c76a2279c9f8bfe2a5b4aa4c4
                                                  • Instruction ID: 824bec710df15b2555e84ef33377ae21b47c18147ebd599e1ee70e990c766d00
                                                  • Opcode Fuzzy Hash: c1e84ea231f73048ff1c9685da0b536c4a350b1c76a2279c9f8bfe2a5b4aa4c4
                                                  • Instruction Fuzzy Hash: FF418F71508385AEC755EF65C44A9DF7BE8FF89380F00182EB4C9C3251EA34D689CB52
                                                  APIs
                                                  • _memset.LIBCMT ref: 006072AA
                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00607351
                                                  • IsMenu.USER32(?), ref: 00607369
                                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 006073B1
                                                  • DrawMenuBar.USER32 ref: 006073C4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Menu$Item$DrawInfoInsert_memset
                                                  • String ID: 0
                                                  • API String ID: 3866635326-4108050209
                                                  • Opcode ID: 0eb968c17e6352cacf48f864ba6abbd17a3955d4377e82d4a5b3ca5859ec5784
                                                  • Instruction ID: 742b33e2ee88a54fee8ef29eece45526f4fd80d42fe03cc14c2b228ba2c3676a
                                                  • Opcode Fuzzy Hash: 0eb968c17e6352cacf48f864ba6abbd17a3955d4377e82d4a5b3ca5859ec5784
                                                  • Instruction Fuzzy Hash: B1412575A44209EFEB28DF50D884ADABBBAFB09311F149429FD15A7390D730AD50DB60
                                                  APIs
                                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00600FD4
                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00600FFE
                                                  • FreeLibrary.KERNEL32(00000000), ref: 006010B5
                                                    • Part of subcall function 00600FA5: RegCloseKey.ADVAPI32(?), ref: 0060101B
                                                    • Part of subcall function 00600FA5: FreeLibrary.KERNEL32(?), ref: 0060106D
                                                    • Part of subcall function 00600FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00601090
                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00601058
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                  • String ID:
                                                  • API String ID: 395352322-0
                                                  • Opcode ID: 293e4be8253bf7657249dab8e09e1024e920dc6668432b49b0f84c5afe27b17f
                                                  • Instruction ID: 4e7ddab3f74a173fdc58225c5c08f7563d99116becd07511e51c757eb741d5c8
                                                  • Opcode Fuzzy Hash: 293e4be8253bf7657249dab8e09e1024e920dc6668432b49b0f84c5afe27b17f
                                                  • Instruction Fuzzy Hash: D2310F71941109BFEB299F90DC89EFFB7BDEF09300F000169E542A6291EA745E859AA0
                                                  APIs
                                                  • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 006062EC
                                                  • GetWindowLongW.USER32(00F24DC0,000000F0), ref: 0060631F
                                                  • GetWindowLongW.USER32(00F24DC0,000000F0), ref: 00606354
                                                  • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00606386
                                                  • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 006063B0
                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 006063C1
                                                  • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 006063DB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: LongWindow$MessageSend
                                                  • String ID:
                                                  • API String ID: 2178440468-0
                                                  • Opcode ID: 00d553aae0c29bddc5928bd2a39e50dd0c1c662bcbff8fc8b5d43de4a9b0d3fe
                                                  • Instruction ID: 415430d90a637864a96a9f82c7238d095a9068f3b66f645463d3290f3374b314
                                                  • Opcode Fuzzy Hash: 00d553aae0c29bddc5928bd2a39e50dd0c1c662bcbff8fc8b5d43de4a9b0d3fe
                                                  • Instruction Fuzzy Hash: B231F4346842609FDB29CF18DC84F9637E2FB4A714F1961A8F5019F2F2CB72AC509B91
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 005DDB2E
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 005DDB54
                                                  • SysAllocString.OLEAUT32(00000000), ref: 005DDB57
                                                  • SysAllocString.OLEAUT32(?), ref: 005DDB75
                                                  • SysFreeString.OLEAUT32(?), ref: 005DDB7E
                                                  • StringFromGUID2.OLE32(?,?,00000028), ref: 005DDBA3
                                                  • SysAllocString.OLEAUT32(?), ref: 005DDBB1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                  • String ID:
                                                  • API String ID: 3761583154-0
                                                  • Opcode ID: c8eaa9dd5193cae17ef254f153057d5b3b015c59ecbcf91bd731932c25388ddb
                                                  • Instruction ID: 17a933be0cf763ae04dd686e7dfa332ebcf29b1ec466d1d3794c09bf5455b83c
                                                  • Opcode Fuzzy Hash: c8eaa9dd5193cae17ef254f153057d5b3b015c59ecbcf91bd731932c25388ddb
                                                  • Instruction Fuzzy Hash: 05217136600219AFEF20DFA8DC88CBB77ADFB09364B018567F914DB291D6709C418B60
                                                  APIs
                                                    • Part of subcall function 005F7D8B: inet_addr.WSOCK32(00000000), ref: 005F7DB6
                                                  • socket.WSOCK32(00000002,00000001,00000006), ref: 005F61C6
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 005F61D5
                                                  • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 005F620E
                                                  • connect.WSOCK32(00000000,?,00000010), ref: 005F6217
                                                  • WSAGetLastError.WSOCK32 ref: 005F6221
                                                  • closesocket.WSOCK32(00000000), ref: 005F624A
                                                  • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 005F6263
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                  • String ID:
                                                  • API String ID: 910771015-0
                                                  • Opcode ID: 2768b772abe10e7134fb0d7f0fe40a7b1b46fe4f485b046011bf9278194bcd88
                                                  • Instruction ID: 6e21383ba34fb77d753005a2ca247ffd0d840e29f421c7aebb6c5728bcd81ef3
                                                  • Opcode Fuzzy Hash: 2768b772abe10e7134fb0d7f0fe40a7b1b46fe4f485b046011bf9278194bcd88
                                                  • Instruction Fuzzy Hash: 1D319035600109ABDF20AF24CC89FBE7BA9FB45714F048429FE05A7291CB74AC04DBA1
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: __wcsnicmp
                                                  • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                  • API String ID: 1038674560-2734436370
                                                  • Opcode ID: abd26865a904e7d487df9687cf9b0c03a0766ba8001bbbdd0e477e2f4dd7b729
                                                  • Instruction ID: a9e621b27cacfb92e9badf0ba9907973483371d7d756a8b6e39cc6b0700f685a
                                                  • Opcode Fuzzy Hash: abd26865a904e7d487df9687cf9b0c03a0766ba8001bbbdd0e477e2f4dd7b729
                                                  • Instruction Fuzzy Hash: 2721497220411267D731AA38AC07EEF7B99FF96344F14443BF94786291EB50DE81D3A5
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 005DDC09
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 005DDC2F
                                                  • SysAllocString.OLEAUT32(00000000), ref: 005DDC32
                                                  • SysAllocString.OLEAUT32 ref: 005DDC53
                                                  • SysFreeString.OLEAUT32 ref: 005DDC5C
                                                  • StringFromGUID2.OLE32(?,?,00000028), ref: 005DDC76
                                                  • SysAllocString.OLEAUT32(?), ref: 005DDC84
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                  • String ID:
                                                  • API String ID: 3761583154-0
                                                  • Opcode ID: 9e07bd65f724874c2153315cdc0f609aacb870ca47fa0e8f809fda44d3466a78
                                                  • Instruction ID: d5e03182c340d399933f29cefd3cc6ba011a4dc2268bf82d1d68cf22d177012b
                                                  • Opcode Fuzzy Hash: 9e07bd65f724874c2153315cdc0f609aacb870ca47fa0e8f809fda44d3466a78
                                                  • Instruction Fuzzy Hash: D2213175614205AFDB20ABACDC88DAB7BEDFB09360B108127F915CB2A1D6B09C41CB64
                                                  APIs
                                                    • Part of subcall function 00581D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00581D73
                                                    • Part of subcall function 00581D35: GetStockObject.GDI32(00000011), ref: 00581D87
                                                    • Part of subcall function 00581D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00581D91
                                                  • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00607632
                                                  • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0060763F
                                                  • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0060764A
                                                  • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00607659
                                                  • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00607665
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$CreateObjectStockWindow
                                                  • String ID: Msctls_Progress32
                                                  • API String ID: 1025951953-3636473452
                                                  • Opcode ID: 2925f9888c36141d2d80850c4c67d52c0703f7b3c88f61c4929bbed3d39778de
                                                  • Instruction ID: 3082122c4c9c4baa861b26d084a41d06e977fed8072d1345299287e06cd2f6f7
                                                  • Opcode Fuzzy Hash: 2925f9888c36141d2d80850c4c67d52c0703f7b3c88f61c4929bbed3d39778de
                                                  • Instruction Fuzzy Hash: DB11B6B1550119BFEF159F64CC85EE77F5EEF08798F014114BA05A2090C672AC21DBA4
                                                  APIs
                                                  • __init_pointers.LIBCMT ref: 005A9AE6
                                                    • Part of subcall function 005A3187: EncodePointer.KERNEL32(00000000), ref: 005A318A
                                                    • Part of subcall function 005A3187: __initp_misc_winsig.LIBCMT ref: 005A31A5
                                                    • Part of subcall function 005A3187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 005A9EA0
                                                    • Part of subcall function 005A3187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 005A9EB4
                                                    • Part of subcall function 005A3187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 005A9EC7
                                                    • Part of subcall function 005A3187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 005A9EDA
                                                    • Part of subcall function 005A3187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 005A9EED
                                                    • Part of subcall function 005A3187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 005A9F00
                                                    • Part of subcall function 005A3187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 005A9F13
                                                    • Part of subcall function 005A3187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 005A9F26
                                                    • Part of subcall function 005A3187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 005A9F39
                                                    • Part of subcall function 005A3187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 005A9F4C
                                                    • Part of subcall function 005A3187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 005A9F5F
                                                    • Part of subcall function 005A3187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 005A9F72
                                                    • Part of subcall function 005A3187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 005A9F85
                                                    • Part of subcall function 005A3187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 005A9F98
                                                    • Part of subcall function 005A3187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 005A9FAB
                                                    • Part of subcall function 005A3187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 005A9FBE
                                                  • __mtinitlocks.LIBCMT ref: 005A9AEB
                                                  • __mtterm.LIBCMT ref: 005A9AF4
                                                    • Part of subcall function 005A9B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,005A9AF9,005A7CD0,0063A0B8,00000014), ref: 005A9C56
                                                    • Part of subcall function 005A9B5C: _free.LIBCMT ref: 005A9C5D
                                                    • Part of subcall function 005A9B5C: DeleteCriticalSection.KERNEL32(02d,?,?,005A9AF9,005A7CD0,0063A0B8,00000014), ref: 005A9C7F
                                                  • __calloc_crt.LIBCMT ref: 005A9B19
                                                  • __initptd.LIBCMT ref: 005A9B3B
                                                  • GetCurrentThreadId.KERNEL32 ref: 005A9B42
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                  • String ID:
                                                  • API String ID: 3567560977-0
                                                  • Opcode ID: 5f82c0f2a9cc483fa8a34c1cddecfbbeb58275e8dd0825e1e101fa06b83963d5
                                                  • Instruction ID: 55c42a3f8d77f6fa6e8328f84bb4e773b981c3d1ea1b80cbee2b1c479aa1de5b
                                                  • Opcode Fuzzy Hash: 5f82c0f2a9cc483fa8a34c1cddecfbbeb58275e8dd0825e1e101fa06b83963d5
                                                  • Instruction Fuzzy Hash: D4F06D326097335AE7347774BC0B68E3E91BB83734B204A1AF461860D2EF61844146B0
                                                  APIs
                                                  • _memset.LIBCMT ref: 0060B644
                                                  • _memset.LIBCMT ref: 0060B653
                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00646F20,00646F64), ref: 0060B682
                                                  • CloseHandle.KERNEL32 ref: 0060B694
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _memset$CloseCreateHandleProcess
                                                  • String ID: od$dod
                                                  • API String ID: 3277943733-267715420
                                                  • Opcode ID: faeb35afcf9d59cadfca45cb0bd092f123fb8ca63bb7a75f4c569f0bd7e11e35
                                                  • Instruction ID: 97abc8c25b2fc64fbf372465888225649e8ff8f73ac3cb13445db6f8971b49b9
                                                  • Opcode Fuzzy Hash: faeb35afcf9d59cadfca45cb0bd092f123fb8ca63bb7a75f4c569f0bd7e11e35
                                                  • Instruction Fuzzy Hash: 4FF05EB65803007AE3502B65FC0AFBB3E9FEB0B795F006020BA48E5592D7724C0587AA
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,005A3F85), ref: 005A4085
                                                  • GetProcAddress.KERNEL32(00000000), ref: 005A408C
                                                  • EncodePointer.KERNEL32(00000000), ref: 005A4097
                                                  • DecodePointer.KERNEL32(005A3F85), ref: 005A40B2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                  • String ID: RoUninitialize$combase.dll
                                                  • API String ID: 3489934621-2819208100
                                                  • Opcode ID: 33a30d028fb322f88325ad173b12124e04ebb2e73919e7c1cd0cfe6ad52519f0
                                                  • Instruction ID: 3b085370372d84def5e028d2709fa1c5ccdc4257d5819ae0f861642f55e9b1f2
                                                  • Opcode Fuzzy Hash: 33a30d028fb322f88325ad173b12124e04ebb2e73919e7c1cd0cfe6ad52519f0
                                                  • Instruction Fuzzy Hash: 00E0EC749C1311EFEB20AFA1FC0EB463AA7BB06742F156024F101E6AA0CBB74644DF14
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _memmove$__itow__swprintf
                                                  • String ID:
                                                  • API String ID: 3253778849-0
                                                  • Opcode ID: 9863102e03c29a5e0e466ba8f1401a9340df7fcea8e799d8c2f609bfb2f3a253
                                                  • Instruction ID: ac41cd57762a36fc1b7ac9fd19169f2900c73a8982fcd37aaa202c5ddc2aa7fd
                                                  • Opcode Fuzzy Hash: 9863102e03c29a5e0e466ba8f1401a9340df7fcea8e799d8c2f609bfb2f3a253
                                                  • Instruction Fuzzy Hash: 77619A3051029B9BCF05FF61CC89ABE3FA8BF95348F084819FD956A192DA359801DB50
                                                  APIs
                                                    • Part of subcall function 00587DE1: _memmove.LIBCMT ref: 00587E22
                                                    • Part of subcall function 00600E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,005FFDAD,?,?), ref: 00600E31
                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006002BD
                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 006002FD
                                                  • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00600320
                                                  • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00600349
                                                  • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0060038C
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00600399
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                  • String ID:
                                                  • API String ID: 4046560759-0
                                                  • Opcode ID: 824e2d6dc88b029fa9db95221ba7ff8a31f34290e2a0282218b30a2b85892a44
                                                  • Instruction ID: 4d72c88cb9384f65613641999e2be6ec07c648651cfe99e63269858b5d8ceddd
                                                  • Opcode Fuzzy Hash: 824e2d6dc88b029fa9db95221ba7ff8a31f34290e2a0282218b30a2b85892a44
                                                  • Instruction Fuzzy Hash: 1A515C311082069FD719EF64C889EAFBBE9FF89314F04491DF855972A1DB31E905CB52
                                                  APIs
                                                  • GetMenu.USER32(?), ref: 006057FB
                                                  • GetMenuItemCount.USER32(00000000), ref: 00605832
                                                  • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0060585A
                                                  • GetMenuItemID.USER32(?,?), ref: 006058C9
                                                  • GetSubMenu.USER32(?,?), ref: 006058D7
                                                  • PostMessageW.USER32(?,00000111,?,00000000), ref: 00605928
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Menu$Item$CountMessagePostString
                                                  • String ID:
                                                  • API String ID: 650687236-0
                                                  • Opcode ID: 930d632ee9cd3a27a28b9a9a160944e93e3a35f56720dd37eac98d9a6834c37d
                                                  • Instruction ID: 449560be01590de708433225df97b198e2d847a415f7b9abd3597701b22ea76a
                                                  • Opcode Fuzzy Hash: 930d632ee9cd3a27a28b9a9a160944e93e3a35f56720dd37eac98d9a6834c37d
                                                  • Instruction Fuzzy Hash: 50513B35A40626AFCF15AF64C8499AFBBB6FF48310F144065EC56BB391CB70AE419F90
                                                  APIs
                                                  • VariantInit.OLEAUT32(?), ref: 005DEF06
                                                  • VariantClear.OLEAUT32(00000013), ref: 005DEF78
                                                  • VariantClear.OLEAUT32(00000000), ref: 005DEFD3
                                                  • _memmove.LIBCMT ref: 005DEFFD
                                                  • VariantClear.OLEAUT32(?), ref: 005DF04A
                                                  • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 005DF078
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Variant$Clear$ChangeInitType_memmove
                                                  • String ID:
                                                  • API String ID: 1101466143-0
                                                  • Opcode ID: 0687d2232427d3b6dc78f9128d5a0248621dd260b07a2995fee586fa3a6f7f58
                                                  • Instruction ID: ab6ff0890c4f00dc8b42e1e57fdf9a90459ef8627e22d0fef3574b88b47ae9b4
                                                  • Opcode Fuzzy Hash: 0687d2232427d3b6dc78f9128d5a0248621dd260b07a2995fee586fa3a6f7f58
                                                  • Instruction Fuzzy Hash: 5E516D75A00209DFCB24DF58C884AAABBF9FF4C314B15856AED5ADB301E335E911CB90
                                                  APIs
                                                  • _memset.LIBCMT ref: 005E2258
                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 005E22A3
                                                  • IsMenu.USER32(00000000), ref: 005E22C3
                                                  • CreatePopupMenu.USER32 ref: 005E22F7
                                                  • GetMenuItemCount.USER32(000000FF), ref: 005E2355
                                                  • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 005E2386
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                  • String ID:
                                                  • API String ID: 3311875123-0
                                                  • Opcode ID: d7d069479a1fbfdd5dd8b3d7eaec64cfcf1fb04b708af23ca89596a67717cd02
                                                  • Instruction ID: 5414e6ec1bba3f407055fc631d1415dc3d88eec382be77da0d4cb788f107bdb8
                                                  • Opcode Fuzzy Hash: d7d069479a1fbfdd5dd8b3d7eaec64cfcf1fb04b708af23ca89596a67717cd02
                                                  • Instruction Fuzzy Hash: 1851C37050028ADFDF29CF69C888B9EBFF9BF49314F144929E89597298D3748944CF51
                                                  APIs
                                                    • Part of subcall function 00582612: GetWindowLongW.USER32(?,000000EB), ref: 00582623
                                                  • BeginPaint.USER32(?,?,?,?,?,?), ref: 0058179A
                                                  • GetWindowRect.USER32(?,?), ref: 005817FE
                                                  • ScreenToClient.USER32(?,?), ref: 0058181B
                                                  • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0058182C
                                                  • EndPaint.USER32(?,?), ref: 00581876
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                  • String ID:
                                                  • API String ID: 1827037458-0
                                                  • Opcode ID: 93b38f61f186ed9a30a9a9805d25295d5ae238ed31e88229630b08bddf5f7ad1
                                                  • Instruction ID: bacdbd00eb1d91327b20e0164611c798f7ba4df43eca797dd539d39c545db521
                                                  • Opcode Fuzzy Hash: 93b38f61f186ed9a30a9a9805d25295d5ae238ed31e88229630b08bddf5f7ad1
                                                  • Instruction Fuzzy Hash: 6F41B030100B019FD710EF24CC89FAA7FEDFB46324F040628F9A5961A2CB719846DB61
                                                  APIs
                                                  • ShowWindow.USER32(006457B0,00000000,00F24DC0,?,?,006457B0,?,0060B5A8,?,?), ref: 0060B712
                                                  • EnableWindow.USER32(00000000,00000000), ref: 0060B736
                                                  • ShowWindow.USER32(006457B0,00000000,00F24DC0,?,?,006457B0,?,0060B5A8,?,?), ref: 0060B796
                                                  • ShowWindow.USER32(00000000,00000004,?,0060B5A8,?,?), ref: 0060B7A8
                                                  • EnableWindow.USER32(00000000,00000001), ref: 0060B7CC
                                                  • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0060B7EF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Window$Show$Enable$MessageSend
                                                  • String ID:
                                                  • API String ID: 642888154-0
                                                  • Opcode ID: 09f8acd62ddf8727bec00afa9ff7896ed2e8e50e7c9755c575f9eed5b297d26c
                                                  • Instruction ID: ebec1994487731056f3ec127771bb4162db14a9b15cb431f05068eb879436e6f
                                                  • Opcode Fuzzy Hash: 09f8acd62ddf8727bec00afa9ff7896ed2e8e50e7c9755c575f9eed5b297d26c
                                                  • Instruction Fuzzy Hash: 62419034680240AFDB2ACF24D499BD67BE2FB45710F1891B9E9488F6A3C731A846CB51
                                                  APIs
                                                  • GetForegroundWindow.USER32(?,?,?,?,?,?,005F4E41,?,?,00000000,00000001), ref: 005F70AC
                                                    • Part of subcall function 005F39A0: GetWindowRect.USER32(?,?), ref: 005F39B3
                                                  • GetDesktopWindow.USER32 ref: 005F70D6
                                                  • GetWindowRect.USER32(00000000), ref: 005F70DD
                                                  • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 005F710F
                                                    • Part of subcall function 005E5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 005E52BC
                                                  • GetCursorPos.USER32(?), ref: 005F713B
                                                  • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 005F7199
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                  • String ID:
                                                  • API String ID: 4137160315-0
                                                  • Opcode ID: 70917dfa95e132d6d47705422e59f65f5e75419daa17a559408d6e3531785a7f
                                                  • Instruction ID: 651740d90c9445361999975f7850f424ac9f303949324dd48e68cb652782a746
                                                  • Opcode Fuzzy Hash: 70917dfa95e132d6d47705422e59f65f5e75419daa17a559408d6e3531785a7f
                                                  • Instruction Fuzzy Hash: DD31D27250930AABD720DF14CC49FABBBAAFF88314F000919F58597191DA74EA09CB92
                                                  APIs
                                                    • Part of subcall function 005D80A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 005D80C0
                                                    • Part of subcall function 005D80A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 005D80CA
                                                    • Part of subcall function 005D80A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 005D80D9
                                                    • Part of subcall function 005D80A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 005D80E0
                                                    • Part of subcall function 005D80A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 005D80F6
                                                  • GetLengthSid.ADVAPI32(?,00000000,005D842F), ref: 005D88CA
                                                  • GetProcessHeap.KERNEL32(00000008,00000000), ref: 005D88D6
                                                  • HeapAlloc.KERNEL32(00000000), ref: 005D88DD
                                                  • CopySid.ADVAPI32(00000000,00000000,?), ref: 005D88F6
                                                  • GetProcessHeap.KERNEL32(00000000,00000000,005D842F), ref: 005D890A
                                                  • HeapFree.KERNEL32(00000000), ref: 005D8911
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                  • String ID:
                                                  • API String ID: 3008561057-0
                                                  • Opcode ID: 89315885e6c76253f1a562b04e75cf70dd6963e06c357d6a9202a44859665c9e
                                                  • Instruction ID: 18137d04922f7ca22b6a53c1dddcb66670becffb31191a8fd796b6cd9c4bad9e
                                                  • Opcode Fuzzy Hash: 89315885e6c76253f1a562b04e75cf70dd6963e06c357d6a9202a44859665c9e
                                                  • Instruction Fuzzy Hash: B811AF71541209FFDB209FA8DC19BBF7B79FB44312F10446AF88597210CB32A940DB60
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 005D85E2
                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 005D85E9
                                                  • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 005D85F8
                                                  • CloseHandle.KERNEL32(00000004), ref: 005D8603
                                                  • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 005D8632
                                                  • DestroyEnvironmentBlock.USERENV(00000000), ref: 005D8646
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                  • String ID:
                                                  • API String ID: 1413079979-0
                                                  • Opcode ID: 8abb04bd50a524b7baafb64639123e4522882a5f04482007d7f3b6cc5a2c7bf3
                                                  • Instruction ID: 9f824fe7b2f2fd0d136c3e595de3f88645df1bc5233cfbba9122a6071c6bcc18
                                                  • Opcode Fuzzy Hash: 8abb04bd50a524b7baafb64639123e4522882a5f04482007d7f3b6cc5a2c7bf3
                                                  • Instruction Fuzzy Hash: 94114A72541209ABDF218FA8ED49BEB7BA9FB08714F044066FE05A2260C6729D60DB61
                                                  APIs
                                                  • GetDC.USER32(00000000), ref: 005DB7B5
                                                  • GetDeviceCaps.GDI32(00000000,00000058), ref: 005DB7C6
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 005DB7CD
                                                  • ReleaseDC.USER32(00000000,00000000), ref: 005DB7D5
                                                  • MulDiv.KERNEL32(000009EC,?,00000000), ref: 005DB7EC
                                                  • MulDiv.KERNEL32(000009EC,?,?), ref: 005DB7FE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CapsDevice$Release
                                                  • String ID:
                                                  • API String ID: 1035833867-0
                                                  • Opcode ID: d98a0680097f0a79539e63f15689f951dab8741c9a656bfca523abdedc4cb8e1
                                                  • Instruction ID: 0a42d272131931d5c948fecf68da922df5130fe78454df51edaf5ab0ea69ddaa
                                                  • Opcode Fuzzy Hash: d98a0680097f0a79539e63f15689f951dab8741c9a656bfca523abdedc4cb8e1
                                                  • Instruction Fuzzy Hash: 310184B5E40209BBEB209BA69C49A5FBFB9EB48311F004076FA08A7391D6719C00CF90
                                                  APIs
                                                  • MapVirtualKeyW.USER32(0000005B,00000000), ref: 005A0193
                                                  • MapVirtualKeyW.USER32(00000010,00000000), ref: 005A019B
                                                  • MapVirtualKeyW.USER32(000000A0,00000000), ref: 005A01A6
                                                  • MapVirtualKeyW.USER32(000000A1,00000000), ref: 005A01B1
                                                  • MapVirtualKeyW.USER32(00000011,00000000), ref: 005A01B9
                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 005A01C1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Virtual
                                                  • String ID:
                                                  • API String ID: 4278518827-0
                                                  • Opcode ID: 84f22b6baa3e4a6953c0cac03187b886ba5b9908c87a59efb33e1b1baefc88cc
                                                  • Instruction ID: d141833be317f592fd7bdee8aa1b84498956a777a9de239f5dea944bf32c290c
                                                  • Opcode Fuzzy Hash: 84f22b6baa3e4a6953c0cac03187b886ba5b9908c87a59efb33e1b1baefc88cc
                                                  • Instruction Fuzzy Hash: 39016CB09417597DE3008F5A8C85B53FFA8FF19354F00411BA15C47941C7F5A864CBE5
                                                  APIs
                                                  • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 005E53F9
                                                  • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 005E540F
                                                  • GetWindowThreadProcessId.USER32(?,?), ref: 005E541E
                                                  • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 005E542D
                                                  • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 005E5437
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 005E543E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                  • String ID:
                                                  • API String ID: 839392675-0
                                                  • Opcode ID: 740bc6f1dd77921803b177d7000f7bc9f81b38153e4594748e0eabaa6af96998
                                                  • Instruction ID: 3accb38d13b23cbfec968e8e48ef7a7bace6e150c9a02b5ca7213a1ff3112cf6
                                                  • Opcode Fuzzy Hash: 740bc6f1dd77921803b177d7000f7bc9f81b38153e4594748e0eabaa6af96998
                                                  • Instruction Fuzzy Hash: 92F01D32281558BBE7315BA29C0DEAB7B7DEBC6B11F001169FA04D1491AAA11A0186B5
                                                  APIs
                                                  • InterlockedExchange.KERNEL32(?,?), ref: 005E7243
                                                  • EnterCriticalSection.KERNEL32(?,?,00590EE4,?,?), ref: 005E7254
                                                  • TerminateThread.KERNEL32(00000000,000001F6,?,00590EE4,?,?), ref: 005E7261
                                                  • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00590EE4,?,?), ref: 005E726E
                                                    • Part of subcall function 005E6C35: CloseHandle.KERNEL32(00000000,?,005E727B,?,00590EE4,?,?), ref: 005E6C3F
                                                  • InterlockedExchange.KERNEL32(?,000001F6), ref: 005E7281
                                                  • LeaveCriticalSection.KERNEL32(?,?,00590EE4,?,?), ref: 005E7288
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                  • String ID:
                                                  • API String ID: 3495660284-0
                                                  • Opcode ID: df9e7ef92a3cc0ea3fc984a6a1d4a558f5aac8fa20bd872577a6f038d74409db
                                                  • Instruction ID: 0cb572bb860e884b79e0e14345e89c32ff4c8ca60a67953cc4b639ce55c95c11
                                                  • Opcode Fuzzy Hash: df9e7ef92a3cc0ea3fc984a6a1d4a558f5aac8fa20bd872577a6f038d74409db
                                                  • Instruction Fuzzy Hash: 70F0823A580712EBE7252BA4ED4C9DB7B3BFF49702B101571F643914A0CB765901CB50
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 005D899D
                                                  • UnloadUserProfile.USERENV(?,?), ref: 005D89A9
                                                  • CloseHandle.KERNEL32(?), ref: 005D89B2
                                                  • CloseHandle.KERNEL32(?), ref: 005D89BA
                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 005D89C3
                                                  • HeapFree.KERNEL32(00000000), ref: 005D89CA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                  • String ID:
                                                  • API String ID: 146765662-0
                                                  • Opcode ID: 9e9c86d5dd891873d1f9822b98f92f2e87f4d1d7c2f2a68d7daa4302bc2ce802
                                                  • Instruction ID: 24979cabf86b51a97edf8768af32de50137d37294257876b5b2cd6e7addbdf83
                                                  • Opcode Fuzzy Hash: 9e9c86d5dd891873d1f9822b98f92f2e87f4d1d7c2f2a68d7daa4302bc2ce802
                                                  • Instruction Fuzzy Hash: B1E0C236084201FBDB115FE1EC0C90ABB7AFB89722B10A230F21981870CB329460DB90
                                                  APIs
                                                  • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00612C7C,?), ref: 005D76EA
                                                  • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00612C7C,?), ref: 005D7702
                                                  • CLSIDFromProgID.OLE32(?,?,00000000,0060FB80,000000FF,?,00000000,00000800,00000000,?,00612C7C,?), ref: 005D7727
                                                  • _memcmp.LIBCMT ref: 005D7748
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: FromProg$FreeTask_memcmp
                                                  • String ID: ,,a
                                                  • API String ID: 314563124-3448921334
                                                  • Opcode ID: 89e86322cf6e6f9cb5b534aa4f7b2651d29a5326d6d30efa3b1e272bf6e6173f
                                                  • Instruction ID: c79d39e4eed2f671a67a93968b890cd5fe2ca11ae33ec6840e9b5394153702b2
                                                  • Opcode Fuzzy Hash: 89e86322cf6e6f9cb5b534aa4f7b2651d29a5326d6d30efa3b1e272bf6e6173f
                                                  • Instruction Fuzzy Hash: 81814F75A00109EFCB14DFA8C984DEEBBB9FF89315F204559F505AB250EB71AE06CB60
                                                  APIs
                                                  • VariantInit.OLEAUT32(?), ref: 005F8613
                                                  • CharUpperBuffW.USER32(?,?), ref: 005F8722
                                                  • VariantClear.OLEAUT32(?), ref: 005F889A
                                                    • Part of subcall function 005E7562: VariantInit.OLEAUT32(00000000), ref: 005E75A2
                                                    • Part of subcall function 005E7562: VariantCopy.OLEAUT32(00000000,?), ref: 005E75AB
                                                    • Part of subcall function 005E7562: VariantClear.OLEAUT32(00000000), ref: 005E75B7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                  • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                  • API String ID: 4237274167-1221869570
                                                  • Opcode ID: fbb069cae081362a956b8b3a5ba81dc07bfc3ec9b5fb15a717da7b1228159601
                                                  • Instruction ID: 19f2703f81a131f50b3a2511f71abe1ae79c268ed4ae7ba109719dc3ee6ce8b6
                                                  • Opcode Fuzzy Hash: fbb069cae081362a956b8b3a5ba81dc07bfc3ec9b5fb15a717da7b1228159601
                                                  • Instruction Fuzzy Hash: 839189706043069FC710EF24C48496ABBE4FFC9754F14892EF98A9B362DB31E905CB92
                                                  APIs
                                                    • Part of subcall function 0059FC86: _wcscpy.LIBCMT ref: 0059FCA9
                                                  • _memset.LIBCMT ref: 005E2B87
                                                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 005E2BB6
                                                  • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 005E2C69
                                                  • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 005E2C97
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                  • String ID: 0
                                                  • API String ID: 4152858687-4108050209
                                                  • Opcode ID: fac26dc1e2a3f15f1ed31fb908feabcee7b865701792284f0ad81854e171950e
                                                  • Instruction ID: dd0cdc7ee0edb76009d50e613c8331394270ca3e555f35aaa9f165d2d503aa25
                                                  • Opcode Fuzzy Hash: fac26dc1e2a3f15f1ed31fb908feabcee7b865701792284f0ad81854e171950e
                                                  • Instruction Fuzzy Hash: 0D51BF71518341ABD7289F2AC845A6FBFECBB99310F240A2DF8DAD2195DB70CC44D752
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _memmove$_free
                                                  • String ID: 3cY$_Y
                                                  • API String ID: 2620147621-2284220399
                                                  • Opcode ID: bb0bdbe0f24e50dc8f7eccc763683d1f576a3ad2dea8883debc726c46e5cd6a0
                                                  • Instruction ID: 64db542df215bb37b0b7f0f8685bf8551aaca239b68bc5dd6f55efdb7fd334ce
                                                  • Opcode Fuzzy Hash: bb0bdbe0f24e50dc8f7eccc763683d1f576a3ad2dea8883debc726c46e5cd6a0
                                                  • Instruction Fuzzy Hash: 175148716043428FDB25CF28C885B6FBBE5BFC5314F45482DE98987261EB31E901CB82
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _memset$_memmove
                                                  • String ID: 3cY$ERCP
                                                  • API String ID: 2532777613-3090354839
                                                  • Opcode ID: 765372824e1ca15e101e55247bed34c85aec2d0e51d4a076de4495c013fc5185
                                                  • Instruction ID: 5d4387bd13a61a30516527a44840d900f158d3895080c9cfd8d850f5f3640eb6
                                                  • Opcode Fuzzy Hash: 765372824e1ca15e101e55247bed34c85aec2d0e51d4a076de4495c013fc5185
                                                  • Instruction Fuzzy Hash: CD519D71900706DBDF24DF69C945BAABBE5FF44304F20496FE44AC7281E770AA44CB91
                                                  APIs
                                                  • _memset.LIBCMT ref: 005E27C0
                                                  • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 005E27DC
                                                  • DeleteMenu.USER32(?,00000007,00000000), ref: 005E2822
                                                  • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00645890,00000000), ref: 005E286B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Menu$Delete$InfoItem_memset
                                                  • String ID: 0
                                                  • API String ID: 1173514356-4108050209
                                                  • Opcode ID: bc35d3229208e2465611a41a0f713d1dddc648ff5c6c5cedd780094fb7350653
                                                  • Instruction ID: 37c239f52ca177195af9f3ff12f328246a0f749a9af83ec13f966d9ecaab8226
                                                  • Opcode Fuzzy Hash: bc35d3229208e2465611a41a0f713d1dddc648ff5c6c5cedd780094fb7350653
                                                  • Instruction Fuzzy Hash: EA417C702083829FD728DF26C844B1ABFE9FF89314F144A6DF9E597296D730A905CB52
                                                  APIs
                                                  • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 005FD7C5
                                                    • Part of subcall function 0058784B: _memmove.LIBCMT ref: 00587899
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: BuffCharLower_memmove
                                                  • String ID: cdecl$none$stdcall$winapi
                                                  • API String ID: 3425801089-567219261
                                                  • Opcode ID: 9131fbccd48be8302869bb5004263618ccb9da37a35d6595b1b92c67caf6c3ab
                                                  • Instruction ID: ac0cd15cebb2b5450d956656a71d6d78c0ad18940b021d5eb39b97ce22d3f514
                                                  • Opcode Fuzzy Hash: 9131fbccd48be8302869bb5004263618ccb9da37a35d6595b1b92c67caf6c3ab
                                                  • Instruction Fuzzy Hash: 6A31CF7190421EABCF00EF54C8559FEBBB6FF45320F108629E825A76D1DB71AD05CB90
                                                  APIs
                                                    • Part of subcall function 00587DE1: _memmove.LIBCMT ref: 00587E22
                                                    • Part of subcall function 005DAA99: GetClassNameW.USER32(?,?,000000FF), ref: 005DAABC
                                                  • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 005D8F14
                                                  • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 005D8F27
                                                  • SendMessageW.USER32(?,00000189,?,00000000), ref: 005D8F57
                                                    • Part of subcall function 00587BCC: _memmove.LIBCMT ref: 00587C06
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$_memmove$ClassName
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 365058703-1403004172
                                                  • Opcode ID: 6daa7dfeac0f9953dad31c6f7b03ae70e18aa62b08db408401e73dab80d8b2aa
                                                  • Instruction ID: a749c9edd768d10a34dcbd9db59ba1683173364bd87414a503c84a1fba057d8e
                                                  • Opcode Fuzzy Hash: 6daa7dfeac0f9953dad31c6f7b03ae70e18aa62b08db408401e73dab80d8b2aa
                                                  • Instruction Fuzzy Hash: 8B21D57194410ABADB24ABA48C49DFF7F7AEF85320B14462BF811672E1DA354849D650
                                                  APIs
                                                  • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 005F184C
                                                  • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 005F1872
                                                  • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 005F18A2
                                                  • InternetCloseHandle.WININET(00000000), ref: 005F18E9
                                                    • Part of subcall function 005F2483: GetLastError.KERNEL32(?,?,005F1817,00000000,00000000,00000001), ref: 005F2498
                                                    • Part of subcall function 005F2483: SetEvent.KERNEL32(?,?,005F1817,00000000,00000000,00000001), ref: 005F24AD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                  • String ID:
                                                  • API String ID: 3113390036-3916222277
                                                  • Opcode ID: e6b9a9591c4bc037ef58b0d5840ad8e6054ac8106d05907b076e646382f7502f
                                                  • Instruction ID: 184f0108a0d740847e1a36af72f0cb75abefb505b8b3dc2d9d9fb816ba88dc85
                                                  • Opcode Fuzzy Hash: e6b9a9591c4bc037ef58b0d5840ad8e6054ac8106d05907b076e646382f7502f
                                                  • Instruction Fuzzy Hash: C621C2B150070CBFEB119F64DD89EBF7BEDFB88784F10412AF60596240EB688D0557A5
                                                  APIs
                                                    • Part of subcall function 00581D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00581D73
                                                    • Part of subcall function 00581D35: GetStockObject.GDI32(00000011), ref: 00581D87
                                                    • Part of subcall function 00581D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00581D91
                                                  • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00606461
                                                  • LoadLibraryW.KERNEL32(?), ref: 00606468
                                                  • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 0060647D
                                                  • DestroyWindow.USER32(?), ref: 00606485
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                  • String ID: SysAnimate32
                                                  • API String ID: 4146253029-1011021900
                                                  • Opcode ID: 53c0c37ff0b46a2e2431e6f1cf5584f89d1ab407038fe2ef0042d69df38b06c5
                                                  • Instruction ID: d5a7064f95afd71c1bf1da0b8607f598d32284e33e7e3db8047d84404f195642
                                                  • Opcode Fuzzy Hash: 53c0c37ff0b46a2e2431e6f1cf5584f89d1ab407038fe2ef0042d69df38b06c5
                                                  • Instruction Fuzzy Hash: B4218E71180205AFEF144F64DC40EBB77EEEF59328F109629F910922E0D7719C6297A0
                                                  APIs
                                                  • GetStdHandle.KERNEL32(0000000C), ref: 005E6DBC
                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 005E6DEF
                                                  • GetStdHandle.KERNEL32(0000000C), ref: 005E6E01
                                                  • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 005E6E3B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CreateHandle$FilePipe
                                                  • String ID: nul
                                                  • API String ID: 4209266947-2873401336
                                                  • Opcode ID: 66e1d4427f781427b529dedf655836bcd4bbeecc1c90c9af9ed4d602e908ba04
                                                  • Instruction ID: 425a19c1458da3730b85888bd487854f1c038ee067bc4883c4565b01195e764a
                                                  • Opcode Fuzzy Hash: 66e1d4427f781427b529dedf655836bcd4bbeecc1c90c9af9ed4d602e908ba04
                                                  • Instruction Fuzzy Hash: A92174B46002499BDB249F66DD05A9A7BA9FF647A0F204A19F8E0D72D0D77099508B50
                                                  APIs
                                                  • GetStdHandle.KERNEL32(000000F6), ref: 005E6E89
                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 005E6EBB
                                                  • GetStdHandle.KERNEL32(000000F6), ref: 005E6ECC
                                                  • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 005E6F06
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CreateHandle$FilePipe
                                                  • String ID: nul
                                                  • API String ID: 4209266947-2873401336
                                                  • Opcode ID: dd6428b359626db8652725fd90cc9ab3afada8c3d92aff1eecd007ccbc398681
                                                  • Instruction ID: 1d310da81d463d37ee08eab85a0fc78b602905cb273e0e395559f2cefe933992
                                                  • Opcode Fuzzy Hash: dd6428b359626db8652725fd90cc9ab3afada8c3d92aff1eecd007ccbc398681
                                                  • Instruction Fuzzy Hash: A52190795003469BDB249F6ADC04AAB7BA8BF657E0F200A59F8E0D72D0D770A9508B50
                                                  APIs
                                                  • SetErrorMode.KERNEL32(00000001), ref: 005EAC54
                                                  • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 005EACA8
                                                  • __swprintf.LIBCMT ref: 005EACC1
                                                  • SetErrorMode.KERNEL32(00000000,00000001,00000000,0060F910), ref: 005EACFF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ErrorMode$InformationVolume__swprintf
                                                  • String ID: %lu
                                                  • API String ID: 3164766367-685833217
                                                  • Opcode ID: 59cb3931e1383ceabfe8bc484b089d13bb4c96ea7f406f6e4e29fbe49ecb60c1
                                                  • Instruction ID: f6cff4d9a12224b6d61a43ca9a237a9fde531e7848f29c4bacd0325341f5f468
                                                  • Opcode Fuzzy Hash: 59cb3931e1383ceabfe8bc484b089d13bb4c96ea7f406f6e4e29fbe49ecb60c1
                                                  • Instruction Fuzzy Hash: 2021A130A0010AAFCB10EF65C949DEF7BB8FF89314B0044A9F809AB251DA31EA45CB61
                                                  APIs
                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,005DFCED,?,005E0D40,?,00008000), ref: 005E115F
                                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,005DFCED,?,005E0D40,?,00008000), ref: 005E1184
                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,005DFCED,?,005E0D40,?,00008000), ref: 005E118E
                                                  • Sleep.KERNEL32(?,?,?,?,?,?,?,005DFCED,?,005E0D40,?,00008000), ref: 005E11C1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CounterPerformanceQuerySleep
                                                  • String ID: @^
                                                  • API String ID: 2875609808-3064354412
                                                  • Opcode ID: ab9d7526a0088da3e276a637d490d90f77a281ddb85d5cf14b4e43c27a7e43a5
                                                  • Instruction ID: 2d673af9bb563e50b086425fe19a89e456dd2b6d3f993069b5391929c0070f79
                                                  • Opcode Fuzzy Hash: ab9d7526a0088da3e276a637d490d90f77a281ddb85d5cf14b4e43c27a7e43a5
                                                  • Instruction Fuzzy Hash: BB112A31D00A5DD7CF189FA6D848AEEBF78FF09751F004495EA81B2240CB709550CBE9
                                                  APIs
                                                  • CharUpperBuffW.USER32(?,?), ref: 005E1B19
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: BuffCharUpper
                                                  • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                  • API String ID: 3964851224-769500911
                                                  • Opcode ID: 6efd6bfb36dcb26b1d7d5b6abefc81171d2faa27eec6396b2f385b9cd03058d5
                                                  • Instruction ID: 87164906e711f066f578a936a0d363b3ac07b43f3566d7b6136bca18af5c54f3
                                                  • Opcode Fuzzy Hash: 6efd6bfb36dcb26b1d7d5b6abefc81171d2faa27eec6396b2f385b9cd03058d5
                                                  • Instruction Fuzzy Hash: D611C0319102598FCF04EFA4D8558FEBFB9FF66304F1484A8E895A7292EB325D06CB44
                                                  APIs
                                                  • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 005FEC07
                                                  • GetProcessIoCounters.KERNEL32(00000000,?), ref: 005FEC37
                                                  • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 005FED6A
                                                  • CloseHandle.KERNEL32(?), ref: 005FEDEB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                  • String ID:
                                                  • API String ID: 2364364464-0
                                                  • Opcode ID: 024669e238434f90eb0ecc08b88da4addea8c1d98212455cf99a9fe6ad2d4695
                                                  • Instruction ID: 322927571d760c42059b4d72bde8d56cf67cd1cd31bd63fdbcbaae192e45ec03
                                                  • Opcode Fuzzy Hash: 024669e238434f90eb0ecc08b88da4addea8c1d98212455cf99a9fe6ad2d4695
                                                  • Instruction Fuzzy Hash: AC8141716043019FD760EF28C84AB3ABBE5BF84714F54881DF99AEB292D674AC418B91
                                                  APIs
                                                    • Part of subcall function 00587DE1: _memmove.LIBCMT ref: 00587E22
                                                    • Part of subcall function 00600E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,005FFDAD,?,?), ref: 00600E31
                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 006000FD
                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0060013C
                                                  • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00600183
                                                  • RegCloseKey.ADVAPI32(?,?), ref: 006001AF
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 006001BC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                  • String ID:
                                                  • API String ID: 3440857362-0
                                                  • Opcode ID: 59972f099a964c084fdf0b77e7bc55d416b6aad42e79ea86a78135a2804b297c
                                                  • Instruction ID: 74d7eed1f74ffb4402dc405605d09a2d57a2bbeba56a524dd12bc7c64992b0a8
                                                  • Opcode Fuzzy Hash: 59972f099a964c084fdf0b77e7bc55d416b6aad42e79ea86a78135a2804b297c
                                                  • Instruction Fuzzy Hash: 0B518C71208205AFD714EF58C885FABBBE9FF84314F44482DF89697291DB31E905CB52
                                                  APIs
                                                    • Part of subcall function 00589837: __itow.LIBCMT ref: 00589862
                                                    • Part of subcall function 00589837: __swprintf.LIBCMT ref: 005898AC
                                                  • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 005FD927
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 005FD9AA
                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 005FD9C6
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 005FDA07
                                                  • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 005FDA21
                                                    • Part of subcall function 00585A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,005E7896,?,?,00000000), ref: 00585A2C
                                                    • Part of subcall function 00585A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,005E7896,?,?,00000000,?,?), ref: 00585A50
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                  • String ID:
                                                  • API String ID: 327935632-0
                                                  • Opcode ID: fceb5e0749d68835c818bc24ba3fdf51bae9ac758407f3635e83e725422d57a7
                                                  • Instruction ID: 52b7f51e37452329b22c225ef9d2de784dc7c2afa60a5b1905e80cdb7681fb33
                                                  • Opcode Fuzzy Hash: fceb5e0749d68835c818bc24ba3fdf51bae9ac758407f3635e83e725422d57a7
                                                  • Instruction Fuzzy Hash: 49512835A0420ADFCB00EFA8C4889AEBBF5FF49310B148065ED55AB312DB35AD45CF91
                                                  APIs
                                                  • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 005EE61F
                                                  • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 005EE648
                                                  • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 005EE687
                                                    • Part of subcall function 00589837: __itow.LIBCMT ref: 00589862
                                                    • Part of subcall function 00589837: __swprintf.LIBCMT ref: 005898AC
                                                  • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 005EE6AC
                                                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 005EE6B4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                  • String ID:
                                                  • API String ID: 1389676194-0
                                                  • Opcode ID: 0f328bcd02200e3a6639799e7e0fb5fd7c90b802b1059dda559568c205c2b62b
                                                  • Instruction ID: 4836b6213990bd7f0e0e7989b4a56c02d9fb73ac5161774c1c98d2f7e15dc9aa
                                                  • Opcode Fuzzy Hash: 0f328bcd02200e3a6639799e7e0fb5fd7c90b802b1059dda559568c205c2b62b
                                                  • Instruction Fuzzy Hash: E8511A35A00106DFCB05EF65C9859AEBBF5FF49314B1480A9E849AB361DB31ED11DF50
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c98f79a9eca633019fa5c69c6643d8a05d3f2a968286c87be8bedd0de822aa30
                                                  • Instruction ID: 4f75fce718ed6bbdcd51bff9f587ae7663796d024d68d55d73100d3b1155466e
                                                  • Opcode Fuzzy Hash: c98f79a9eca633019fa5c69c6643d8a05d3f2a968286c87be8bedd0de822aa30
                                                  • Instruction Fuzzy Hash: 1A41D735984314AFD728DFA8CC48FEBBBA6EB09390F1402A5F816A73E1C7709D41DA51
                                                  APIs
                                                  • GetCursorPos.USER32(?), ref: 00582357
                                                  • ScreenToClient.USER32(006457B0,?), ref: 00582374
                                                  • GetAsyncKeyState.USER32(00000001), ref: 00582399
                                                  • GetAsyncKeyState.USER32(00000002), ref: 005823A7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: AsyncState$ClientCursorScreen
                                                  • String ID:
                                                  • API String ID: 4210589936-0
                                                  • Opcode ID: 0ac8ffb691973b6f908af46895b45012823ec51d168a76179e8de36b8283dc30
                                                  • Instruction ID: 427e48b77dc693cdfc20c55ab8a088ee5921bdd98534e908d861d17711001240
                                                  • Opcode Fuzzy Hash: 0ac8ffb691973b6f908af46895b45012823ec51d168a76179e8de36b8283dc30
                                                  • Instruction Fuzzy Hash: CD418475604109FBDF29AF68CC48AEEBF75FB05360F204759F829A2190CB34A950DF91
                                                  APIs
                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005D63E7
                                                  • TranslateAcceleratorW.USER32(?,?,?), ref: 005D6433
                                                  • TranslateMessage.USER32(?), ref: 005D645C
                                                  • DispatchMessageW.USER32(?), ref: 005D6466
                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005D6475
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                  • String ID:
                                                  • API String ID: 2108273632-0
                                                  • Opcode ID: 0c022281a37b39ea585b2b912ef46a4dccc3c4b6194a4f2584ce8b9331ef1739
                                                  • Instruction ID: 04ac5d47b9ed3744c73e8f6d6a6bf2a765e48b3b1e8f25cd7e638713be679d7f
                                                  • Opcode Fuzzy Hash: 0c022281a37b39ea585b2b912ef46a4dccc3c4b6194a4f2584ce8b9331ef1739
                                                  • Instruction Fuzzy Hash: 1131C431940646AFDF74CFB8CC84BB67FA9BB01310F141577E422C32A2E765984ADB61
                                                  APIs
                                                  • GetWindowRect.USER32(?,?), ref: 005D8A30
                                                  • PostMessageW.USER32(?,00000201,00000001), ref: 005D8ADA
                                                  • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 005D8AE2
                                                  • PostMessageW.USER32(?,00000202,00000000), ref: 005D8AF0
                                                  • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 005D8AF8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessagePostSleep$RectWindow
                                                  • String ID:
                                                  • API String ID: 3382505437-0
                                                  • Opcode ID: 5fd18ceea31ccfe96f9ff4b1bd03f6f2e8521df73f5d7641e00820d24e9c8bb9
                                                  • Instruction ID: b4ec78ff090a0a75b333b75748753e26da93f612e59a415fa189995654bdcefe
                                                  • Opcode Fuzzy Hash: 5fd18ceea31ccfe96f9ff4b1bd03f6f2e8521df73f5d7641e00820d24e9c8bb9
                                                  • Instruction Fuzzy Hash: 0A31B171500219EBDB24CF6CD94CAAE3BB5FB04325F10426BF925E62D0CBB09914DB90
                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 005DB204
                                                  • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 005DB221
                                                  • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 005DB259
                                                  • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 005DB27F
                                                  • _wcsstr.LIBCMT ref: 005DB289
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                  • String ID:
                                                  • API String ID: 3902887630-0
                                                  • Opcode ID: 90578f411c60bb4e0a6f5066e4ecf2592cb914acaa2af6ae29621d9bcf4bc605
                                                  • Instruction ID: 8a16db3788d94b7420bd797cdbdbffe7a79f56ba0628ee558d1ab276487ff0ab
                                                  • Opcode Fuzzy Hash: 90578f411c60bb4e0a6f5066e4ecf2592cb914acaa2af6ae29621d9bcf4bc605
                                                  • Instruction Fuzzy Hash: 5D212836204201BBFB359B799C09E7F7F9EEF8A710F01412BF804CA291EB61CC409260
                                                  APIs
                                                    • Part of subcall function 00582612: GetWindowLongW.USER32(?,000000EB), ref: 00582623
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 0060B192
                                                  • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0060B1B7
                                                  • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0060B1CF
                                                  • GetSystemMetrics.USER32(00000004), ref: 0060B1F8
                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,005F0E90,00000000), ref: 0060B216
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Window$Long$MetricsSystem
                                                  • String ID:
                                                  • API String ID: 2294984445-0
                                                  • Opcode ID: f23144d6aabd0d9fa9d8f02a1f7e21a31b1dff6c475e9536927ccdf2b7374cb5
                                                  • Instruction ID: 1bba479e0ffb680068cc7235ded294094d19dadd8611832cdc0a80566927575a
                                                  • Opcode Fuzzy Hash: f23144d6aabd0d9fa9d8f02a1f7e21a31b1dff6c475e9536927ccdf2b7374cb5
                                                  • Instruction Fuzzy Hash: 9B219471590261AFCB249F38DC14AAB3BA6FB15721F149734FD32D72E1E73099118B90
                                                  APIs
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 005D9320
                                                    • Part of subcall function 00587BCC: _memmove.LIBCMT ref: 00587C06
                                                  • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 005D9352
                                                  • __itow.LIBCMT ref: 005D936A
                                                  • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 005D9392
                                                  • __itow.LIBCMT ref: 005D93A3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$__itow$_memmove
                                                  • String ID:
                                                  • API String ID: 2983881199-0
                                                  • Opcode ID: aa66f2dc0fbe2dcb38491a26bd6a8512824d3269b4a316d15b2c3cfafdf4b1b0
                                                  • Instruction ID: 800f1b81cb6a8fa0003d92fe798ccc79cf78ffcd8555470f5a0e9d2272863aa0
                                                  • Opcode Fuzzy Hash: aa66f2dc0fbe2dcb38491a26bd6a8512824d3269b4a316d15b2c3cfafdf4b1b0
                                                  • Instruction Fuzzy Hash: E521B031700209ABDB20AB688C89EAE7FA9FBC9710F144427FD05EB3D1D6B0CD419791
                                                  APIs
                                                  • IsWindow.USER32(00000000), ref: 005F5A6E
                                                  • GetForegroundWindow.USER32 ref: 005F5A85
                                                  • GetDC.USER32(00000000), ref: 005F5AC1
                                                  • GetPixel.GDI32(00000000,?,00000003), ref: 005F5ACD
                                                  • ReleaseDC.USER32(00000000,00000003), ref: 005F5B08
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Window$ForegroundPixelRelease
                                                  • String ID:
                                                  • API String ID: 4156661090-0
                                                  • Opcode ID: 42eb8fb454eacbe77ae6f8e85dbb192c30885dd0b09ccbb7e4534fb5f6ad34c9
                                                  • Instruction ID: fadc5842626f5c266872e1cf3f321a67dfef8b30074216b59d99de362299da03
                                                  • Opcode Fuzzy Hash: 42eb8fb454eacbe77ae6f8e85dbb192c30885dd0b09ccbb7e4534fb5f6ad34c9
                                                  • Instruction Fuzzy Hash: 6021A135A00104AFDB14EF65DC88AAABBE5FF88311F148479F94997762DA75AC00CB90
                                                  APIs
                                                  • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0058134D
                                                  • SelectObject.GDI32(?,00000000), ref: 0058135C
                                                  • BeginPath.GDI32(?), ref: 00581373
                                                  • SelectObject.GDI32(?,00000000), ref: 0058139C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ObjectSelect$BeginCreatePath
                                                  • String ID:
                                                  • API String ID: 3225163088-0
                                                  • Opcode ID: c86d95fca0533c1b323f6c56b104928c131b70d3604b4009be99797f9bf40880
                                                  • Instruction ID: 6dc3050cd1eafc3d6a38b4295b20f553d394905157192a41b8eb78f2bc4a9a2f
                                                  • Opcode Fuzzy Hash: c86d95fca0533c1b323f6c56b104928c131b70d3604b4009be99797f9bf40880
                                                  • Instruction Fuzzy Hash: 5121B034900B18EFDB10AF25DC047AA3FEAFB01321F145626F816A65B1DF709892CF94
                                                  APIs
                                                  • GetCurrentThreadId.KERNEL32 ref: 005E4ABA
                                                  • __beginthreadex.LIBCMT ref: 005E4AD8
                                                  • MessageBoxW.USER32(?,?,?,?), ref: 005E4AED
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 005E4B03
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 005E4B0A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                  • String ID:
                                                  • API String ID: 3824534824-0
                                                  • Opcode ID: f58fc114814b9c1d04618d08deebff86a7f7032f9ef0ddedfec44d9256584c68
                                                  • Instruction ID: 1262007c603b46906f51644839d9d67108af69d00a7c92931e23ca3773a4a82d
                                                  • Opcode Fuzzy Hash: f58fc114814b9c1d04618d08deebff86a7f7032f9ef0ddedfec44d9256584c68
                                                  • Instruction Fuzzy Hash: D0110876904244BBCB149FA99C08A9B7FAEFB45320F144266F815D3351D6B1C9048BA0
                                                  APIs
                                                  • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 005D821E
                                                  • GetLastError.KERNEL32(?,005D7CE2,?,?,?), ref: 005D8228
                                                  • GetProcessHeap.KERNEL32(00000008,?,?,005D7CE2,?,?,?), ref: 005D8237
                                                  • HeapAlloc.KERNEL32(00000000,?,005D7CE2,?,?,?), ref: 005D823E
                                                  • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 005D8255
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                  • String ID:
                                                  • API String ID: 842720411-0
                                                  • Opcode ID: dcbfaf72048d6c0cc7cf52f3473d74cd3cf6a945ae28f4e45ad8f082e51e1f3c
                                                  • Instruction ID: 913545cbafb97f352fcfe227dd0dc5d9a0bccf6dd6477c18555cb4583f73158b
                                                  • Opcode Fuzzy Hash: dcbfaf72048d6c0cc7cf52f3473d74cd3cf6a945ae28f4e45ad8f082e51e1f3c
                                                  • Instruction Fuzzy Hash: 85016D75240204BFDB308FA9DC49D6B7FBEFF8A754B50046AF809C2220DA329C00CA60
                                                  APIs
                                                  • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,005D7044,80070057,?,?,?,005D7455), ref: 005D7127
                                                  • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,005D7044,80070057,?,?), ref: 005D7142
                                                  • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,005D7044,80070057,?,?), ref: 005D7150
                                                  • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,005D7044,80070057,?), ref: 005D7160
                                                  • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,005D7044,80070057,?,?), ref: 005D716C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: From$Prog$FreeStringTasklstrcmpi
                                                  • String ID:
                                                  • API String ID: 3897988419-0
                                                  • Opcode ID: 014308c56bcb45ff049c3493330ac7392ade776d75828e767212c1cf574f154c
                                                  • Instruction ID: 8574cec7e16b71ab384d2e68d9b37b602b224fea733a4286b5516fdd2496dfa1
                                                  • Opcode Fuzzy Hash: 014308c56bcb45ff049c3493330ac7392ade776d75828e767212c1cf574f154c
                                                  • Instruction Fuzzy Hash: 21017172601218ABDB214FA8DC44AAA7FBDFB48751F144166FD04D2310E731DD40D7A0
                                                  APIs
                                                  • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 005E5260
                                                  • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 005E526E
                                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 005E5276
                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 005E5280
                                                  • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 005E52BC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: PerformanceQuery$CounterSleep$Frequency
                                                  • String ID:
                                                  • API String ID: 2833360925-0
                                                  • Opcode ID: 84c567e998d85f819dfab9736eb34afeb88366a32f93f3d49b0e535482c1e23c
                                                  • Instruction ID: a540123b5013149aa51a084304ff5d55bc2d9a146dd83f62be71bc01ad4bbde0
                                                  • Opcode Fuzzy Hash: 84c567e998d85f819dfab9736eb34afeb88366a32f93f3d49b0e535482c1e23c
                                                  • Instruction Fuzzy Hash: A5016935D01A1DDBCF14EFE5E848AEEBF79FB08315F400496EA81B2240DB3095508BA1
                                                  APIs
                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 005D8121
                                                  • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 005D812B
                                                  • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 005D813A
                                                  • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 005D8141
                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 005D8157
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                  • String ID:
                                                  • API String ID: 44706859-0
                                                  • Opcode ID: e21e6dae4a4c3bf6d4e41c948f354dfe0bc818e76619629c434c4e3c3764fcb0
                                                  • Instruction ID: 8d9abce819d124daaa969325f13de880f380e00565a8813354bfecd8f26cd70e
                                                  • Opcode Fuzzy Hash: e21e6dae4a4c3bf6d4e41c948f354dfe0bc818e76619629c434c4e3c3764fcb0
                                                  • Instruction Fuzzy Hash: 22F06271240314AFEB310FA9EC89F773FADFF49754B000026F945C6250CB619D45DA60
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003E9), ref: 005DC1F7
                                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 005DC20E
                                                  • MessageBeep.USER32(00000000), ref: 005DC226
                                                  • KillTimer.USER32(?,0000040A), ref: 005DC242
                                                  • EndDialog.USER32(?,00000001), ref: 005DC25C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                  • String ID:
                                                  • API String ID: 3741023627-0
                                                  • Opcode ID: 5c9c295eeee8729cc9d6fdd3c4f59c83c7a74bba15f9e79b42e56e4d50b315c5
                                                  • Instruction ID: aa77f7ab1f464f59585014162403375a738b2e43fe7096aaa16e798d139d8f49
                                                  • Opcode Fuzzy Hash: 5c9c295eeee8729cc9d6fdd3c4f59c83c7a74bba15f9e79b42e56e4d50b315c5
                                                  • Instruction Fuzzy Hash: 0201A234494305ABEB315B64ED4EB977FB9BB00B06F04066BF582A19E0DBE1A944CB90
                                                  APIs
                                                  • EndPath.GDI32(?), ref: 005813BF
                                                  • StrokeAndFillPath.GDI32(?,?,005BB888,00000000,?), ref: 005813DB
                                                  • SelectObject.GDI32(?,00000000), ref: 005813EE
                                                  • DeleteObject.GDI32 ref: 00581401
                                                  • StrokePath.GDI32(?), ref: 0058141C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Path$ObjectStroke$DeleteFillSelect
                                                  • String ID:
                                                  • API String ID: 2625713937-0
                                                  • Opcode ID: ccc50cb3e813d242aeb5e4c542d16aba79bcf329f1fce7b265b86a7b6ca4fb07
                                                  • Instruction ID: ddabb253d1a7bc9ec837564b4fa5878893003ebe022d89b962e4c42b4bab4197
                                                  • Opcode Fuzzy Hash: ccc50cb3e813d242aeb5e4c542d16aba79bcf329f1fce7b265b86a7b6ca4fb07
                                                  • Instruction Fuzzy Hash: 81F0E134054B18DFDB216F16EC4C7593FAAB702326F08E224E86B594F2CB314596DF54
                                                  APIs
                                                    • Part of subcall function 005A0DB6: std::exception::exception.LIBCMT ref: 005A0DEC
                                                    • Part of subcall function 005A0DB6: __CxxThrowException@8.LIBCMT ref: 005A0E01
                                                    • Part of subcall function 00587DE1: _memmove.LIBCMT ref: 00587E22
                                                    • Part of subcall function 00587A51: _memmove.LIBCMT ref: 00587AAB
                                                  • __swprintf.LIBCMT ref: 00592ECD
                                                  Strings
                                                  • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00592D66
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                  • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                  • API String ID: 1943609520-557222456
                                                  • Opcode ID: e9e1f08e43748bd4c1e2b7c2758e391362b48e17d3d758b8176dd5009e25609f
                                                  • Instruction ID: 476969fca80c9fdca4f23bdada58dffd1dba7df5d1f9e1a580821aded151e30f
                                                  • Opcode Fuzzy Hash: e9e1f08e43748bd4c1e2b7c2758e391362b48e17d3d758b8176dd5009e25609f
                                                  • Instruction Fuzzy Hash: 0D913D71118206AFCB14FF64C889D7EBFA8FF85714F14491DF855AB2A1EA20EE44CB52
                                                  APIs
                                                    • Part of subcall function 00584750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00584743,?,?,005837AE,?), ref: 00584770
                                                  • CoInitialize.OLE32(00000000), ref: 005EB9BB
                                                  • CoCreateInstance.OLE32(00612D6C,00000000,00000001,00612BDC,?), ref: 005EB9D4
                                                  • CoUninitialize.OLE32 ref: 005EB9F1
                                                    • Part of subcall function 00589837: __itow.LIBCMT ref: 00589862
                                                    • Part of subcall function 00589837: __swprintf.LIBCMT ref: 005898AC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                  • String ID: .lnk
                                                  • API String ID: 2126378814-24824748
                                                  • Opcode ID: 35f2928598f3aaf0fbd142ae87d31eca44a772628bd3ab3eb28147587bd9cdf4
                                                  • Instruction ID: 63ca0405b2e81122bb9e8a243465c71335936f39947c0a3ace6cf22293da6cb0
                                                  • Opcode Fuzzy Hash: 35f2928598f3aaf0fbd142ae87d31eca44a772628bd3ab3eb28147587bd9cdf4
                                                  • Instruction Fuzzy Hash: 34A179756043429FCB04EF15C884D6ABBE5FF89314F148998F89A9B361CB31EC45CB91
                                                  APIs
                                                  • OleSetContainedObject.OLE32(?,00000001), ref: 005DB4BE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ContainedObject
                                                  • String ID: AutoIt3GUI$Container$%a
                                                  • API String ID: 3565006973-3369376152
                                                  • Opcode ID: 4e343f454ffdb2e369c5d083a49ff73b2b6b90c87a3d7813654da7076d30d47f
                                                  • Instruction ID: 349f7afa77fd54ab5c675d89df1b2550bb863c5ad35308545d0808b6075a7c58
                                                  • Opcode Fuzzy Hash: 4e343f454ffdb2e369c5d083a49ff73b2b6b90c87a3d7813654da7076d30d47f
                                                  • Instruction Fuzzy Hash: 5C913A70600601EFEB24DF68C884A6ABBF6FF49710F15856EE946CB391EB71E841CB50
                                                  APIs
                                                  • __startOneArgErrorHandling.LIBCMT ref: 005A50AD
                                                    • Part of subcall function 005B00F0: __87except.LIBCMT ref: 005B012B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ErrorHandling__87except__start
                                                  • String ID: pow
                                                  • API String ID: 2905807303-2276729525
                                                  • Opcode ID: 6f2707356288af193c79da8b13b41d09ad66afe85e1fff845716d674db5beef4
                                                  • Instruction ID: 95a95805760a0aedc052858ec68ef1aad1e647e5ac4cd97cff4c03d554c27177
                                                  • Opcode Fuzzy Hash: 6f2707356288af193c79da8b13b41d09ad66afe85e1fff845716d674db5beef4
                                                  • Instruction Fuzzy Hash: 1751792590860286DB15B728CC09BFF6F95BB42700F249D59E4D6862E9FF349DC8DAC2
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _memmove
                                                  • String ID: 3cY$_Y
                                                  • API String ID: 4104443479-2284220399
                                                  • Opcode ID: f80e7eec4bd7bab892e5149f52509267c4693e75425eb20f5ea22b083cf96a37
                                                  • Instruction ID: b2787756bec5b03593ac792b1d6cf37d4c182fff8b0b18f1b9d2fcbaed944e2f
                                                  • Opcode Fuzzy Hash: f80e7eec4bd7bab892e5149f52509267c4693e75425eb20f5ea22b083cf96a37
                                                  • Instruction Fuzzy Hash: 4E510970A006199FCF64CFA8C884ABEBBB1FF45314F14852DE85AD7250EB31A996CF51
                                                  APIs
                                                    • Part of subcall function 005E14BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,005D9296,?,?,00000034,00000800,?,00000034), ref: 005E14E6
                                                  • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 005D983F
                                                    • Part of subcall function 005E1487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,005D92C5,?,?,00000800,?,00001073,00000000,?,?), ref: 005E14B1
                                                    • Part of subcall function 005E13DE: GetWindowThreadProcessId.USER32(?,?), ref: 005E1409
                                                    • Part of subcall function 005E13DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,005D925A,00000034,?,?,00001004,00000000,00000000), ref: 005E1419
                                                    • Part of subcall function 005E13DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,005D925A,00000034,?,?,00001004,00000000,00000000), ref: 005E142F
                                                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 005D98AC
                                                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 005D98F9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                  • String ID: @
                                                  • API String ID: 4150878124-2766056989
                                                  • Opcode ID: fe7635c9cc35e22e14cde3e13e036bafddf34135da34bd091742327e73af1f4a
                                                  • Instruction ID: 5a0f61958d02161de636134a1504f9d62ae853fe28ce51245b19f3e384871dcf
                                                  • Opcode Fuzzy Hash: fe7635c9cc35e22e14cde3e13e036bafddf34135da34bd091742327e73af1f4a
                                                  • Instruction Fuzzy Hash: E1415076900119AFCF24DFA4CD45EDEBBB8FB49700F00419AF945B7291DA716E45CBA0
                                                  APIs
                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0060F910,00000000,?,?,?,?), ref: 006079DF
                                                  • GetWindowLongW.USER32 ref: 006079FC
                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00607A0C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Window$Long
                                                  • String ID: SysTreeView32
                                                  • API String ID: 847901565-1698111956
                                                  • Opcode ID: 2efd3d6caee5ab560426a0d5b356b833549fcd820cb060c0f702233c5c4fa181
                                                  • Instruction ID: 925e08e89cb1eb82d907b92bac9377060f398691af5bb0293226b25b41221554
                                                  • Opcode Fuzzy Hash: 2efd3d6caee5ab560426a0d5b356b833549fcd820cb060c0f702233c5c4fa181
                                                  • Instruction Fuzzy Hash: 9131DE31684606AFDB259F38CC45BEB7BAAFB45324F208725F875A22E0D731E9518B50
                                                  APIs
                                                  • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00607461
                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00607475
                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00607499
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window
                                                  • String ID: SysMonthCal32
                                                  • API String ID: 2326795674-1439706946
                                                  • Opcode ID: fe037679b600609882a2fe0a3d2e37cbe0cdbab1b14d0c6a51e705778f1a38cb
                                                  • Instruction ID: a650f53900bf9d1a529579233edcd136d415ec7cc9a3826a1aa0fa7d964d20f0
                                                  • Opcode Fuzzy Hash: fe037679b600609882a2fe0a3d2e37cbe0cdbab1b14d0c6a51e705778f1a38cb
                                                  • Instruction Fuzzy Hash: 58219F32540219ABDF258F64CC46FEB3BAAFB48724F110214FE556B1D0DAB5BC51DBA0
                                                  APIs
                                                  • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00607C4A
                                                  • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00607C58
                                                  • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00607C5F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$DestroyWindow
                                                  • String ID: msctls_updown32
                                                  • API String ID: 4014797782-2298589950
                                                  • Opcode ID: c16b2bf619f42db1145d003c0c43b4ab91a5243c6ec0f99e4c94f9affb3c1e7d
                                                  • Instruction ID: df9b2ee6fd05cd6ec5779019dc4725c70c62b68638a048a6063f01f864086fcd
                                                  • Opcode Fuzzy Hash: c16b2bf619f42db1145d003c0c43b4ab91a5243c6ec0f99e4c94f9affb3c1e7d
                                                  • Instruction Fuzzy Hash: 3A217CB5644209AFEB14DF28DCC1DA73BEEEB4A354B140059FA019B3A1CB71EC518BA0
                                                  APIs
                                                  • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00606D3B
                                                  • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00606D4B
                                                  • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00606D70
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$MoveWindow
                                                  • String ID: Listbox
                                                  • API String ID: 3315199576-2633736733
                                                  • Opcode ID: db6161df473384e95d3766fc190431301969109d4d4df6abca48487cfa76f95a
                                                  • Instruction ID: a53355020c56bca753d5b4eb3752caf1cb4a216b51083111d1d133d1cc555e3d
                                                  • Opcode Fuzzy Hash: db6161df473384e95d3766fc190431301969109d4d4df6abca48487cfa76f95a
                                                  • Instruction Fuzzy Hash: 96218032690118BFEF158F54DC45FEB3BABEF89760F018128F9459B2E0C6719C619BA0
                                                  APIs
                                                  • __snwprintf.LIBCMT ref: 005F3A66
                                                    • Part of subcall function 00587DE1: _memmove.LIBCMT ref: 00587E22
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: __snwprintf_memmove
                                                  • String ID: , $$AUTOITCALLVARIABLE%d$%a
                                                  • API String ID: 3506404897-3928141158
                                                  • Opcode ID: b200a334952ec126bdc13b849d04d9db0fcbf720f3ca9cad775c7a865a0ea846
                                                  • Instruction ID: 596222bd7b0c3cbbfa99703a6107cd4b49c19b71422109f0cc15c9eab1c4a259
                                                  • Opcode Fuzzy Hash: b200a334952ec126bdc13b849d04d9db0fcbf720f3ca9cad775c7a865a0ea846
                                                  • Instruction Fuzzy Hash: 5321307160021EAECF10EF65CC85AAE7FA5BF88700F544455F945B7182DB34EA45CBA1
                                                  APIs
                                                  • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00607772
                                                  • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00607787
                                                  • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00607794
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID: msctls_trackbar32
                                                  • API String ID: 3850602802-1010561917
                                                  • Opcode ID: bdf9d82b82dd1342b8146d542926284c6addc5bd0bbf8d858e73d0789b057fab
                                                  • Instruction ID: f553dbea060ea5f35c3384665021da910d6c6d4bb6ec6e7216c14a687aadf3ff
                                                  • Opcode Fuzzy Hash: bdf9d82b82dd1342b8146d542926284c6addc5bd0bbf8d858e73d0789b057fab
                                                  • Instruction Fuzzy Hash: BF11E772684209BBEF245F65CC05FD7776AEF89B54F114128FA41A61D0D672E811CB20
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: __calloc_crt
                                                  • String ID: c$@Bd
                                                  • API String ID: 3494438863-1202302672
                                                  • Opcode ID: 7d2d10171700224a3cde6f9eee6477aae0b1ee466a11bb241df3a896c0046191
                                                  • Instruction ID: d572f263c6c4b64996a4e38d6b66d37e2b5ed9bb33be87ce7583cc04eb1a7f14
                                                  • Opcode Fuzzy Hash: 7d2d10171700224a3cde6f9eee6477aae0b1ee466a11bb241df3a896c0046191
                                                  • Instruction Fuzzy Hash: 42F06875204A168BF7648F54BC51B6B2F96F747734F540417E101CE192EBB0894147E4
                                                  APIs
                                                  • __lock.LIBCMT ref: 005A9B94
                                                    • Part of subcall function 005A9C0B: __mtinitlocknum.LIBCMT ref: 005A9C1D
                                                    • Part of subcall function 005A9C0B: EnterCriticalSection.KERNEL32(00000000,?,005A9A7C,0000000D), ref: 005A9C36
                                                  • __updatetlocinfoEx_nolock.LIBCMT ref: 005A9BA4
                                                    • Part of subcall function 005A9100: ___addlocaleref.LIBCMT ref: 005A911C
                                                    • Part of subcall function 005A9100: ___removelocaleref.LIBCMT ref: 005A9127
                                                    • Part of subcall function 005A9100: ___freetlocinfo.LIBCMT ref: 005A913B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CriticalEnterEx_nolockSection___addlocaleref___freetlocinfo___removelocaleref__lock__mtinitlocknum__updatetlocinfo
                                                  • String ID: 8c$8c
                                                  • API String ID: 547918592-2534763320
                                                  • Opcode ID: fe479de118b5a7850d2c62875687f8fe61c405c1cd1064731ca87f1ded3b0826
                                                  • Instruction ID: c0317997a297ea0e13082e8b96cf839522fd54f6c24ef77010c6e5376d0a321f
                                                  • Opcode Fuzzy Hash: fe479de118b5a7850d2c62875687f8fe61c405c1cd1064731ca87f1ded3b0826
                                                  • Instruction Fuzzy Hash: DFE08C31947326ABEB11BBA46E0BB5DBE61BB82B31F20115AF047550C2CDB1480086B7
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00584BD0,?,00584DEF,?,006452F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00584C11
                                                  • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00584C23
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                  • API String ID: 2574300362-3689287502
                                                  • Opcode ID: 2a1bc0bade6b3dd9db3a36bcfdda8a0fd8c123f4d4d1a7511d9709c6df07c5c2
                                                  • Instruction ID: f49e02da10ecc217e037c2effa2593101bc37952662c5234b670dd8d41981c39
                                                  • Opcode Fuzzy Hash: 2a1bc0bade6b3dd9db3a36bcfdda8a0fd8c123f4d4d1a7511d9709c6df07c5c2
                                                  • Instruction Fuzzy Hash: 38D01231551723CFD730AF71D908607BADAFF09351B118C799886D7550E7B0D880CB50
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00584B83,?), ref: 00584C44
                                                  • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00584C56
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                  • API String ID: 2574300362-1355242751
                                                  • Opcode ID: ceb314310e25acce58deacce5c3fa1a7438fce4f8dbb8a8184e3c1d69159be1c
                                                  • Instruction ID: 40e3a61251dfa715804f217adf05a7641cafe4f61bf960b160bff170bfa85c67
                                                  • Opcode Fuzzy Hash: ceb314310e25acce58deacce5c3fa1a7438fce4f8dbb8a8184e3c1d69159be1c
                                                  • Instruction Fuzzy Hash: 1CD01771550713CFD734AF31D90860B7AEABF05351B12887A9896E69A0EB70D880CB90
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(advapi32.dll,?,00601039), ref: 00600DF5
                                                  • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00600E07
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: RegDeleteKeyExW$advapi32.dll
                                                  • API String ID: 2574300362-4033151799
                                                  • Opcode ID: 805ffc4c629abd502d3ac12c47bf92e367e8888134472780a4307d32bf5cd40a
                                                  • Instruction ID: 8727f98948f0a821c35b0dc3770ecb9d1757e25e8408b2275494a8faa831960a
                                                  • Opcode Fuzzy Hash: 805ffc4c629abd502d3ac12c47bf92e367e8888134472780a4307d32bf5cd40a
                                                  • Instruction Fuzzy Hash: C4D01770590722CFE7219F75C8087C776E7AF04362F129C7E9486E2690EAB0D8D0CAA0
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(kernel32.dll,00000001,005F8CF4,?,0060F910), ref: 005F90EE
                                                  • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 005F9100
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: GetModuleHandleExW$kernel32.dll
                                                  • API String ID: 2574300362-199464113
                                                  • Opcode ID: 185c215a737570c7ecbb2b766828ff693f8651def84dd5f4bd4afedde2ee0607
                                                  • Instruction ID: 0d2609cae980e61322e2c4c81c65cd78336424f439daf956d41d721b7f38e2ad
                                                  • Opcode Fuzzy Hash: 185c215a737570c7ecbb2b766828ff693f8651def84dd5f4bd4afedde2ee0607
                                                  • Instruction Fuzzy Hash: E6D01734590B13CFDB309F31D818A577AE6BF05391B12887EA686D79A0EB74C880CA90
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: LocalTime__swprintf
                                                  • String ID: %.3d$WIN_XPe
                                                  • API String ID: 2070861257-2409531811
                                                  • Opcode ID: 1fe10878c5bd0db9fa0ef5a334889de91ade550f43a6e8fe0e7b43a19787d1f7
                                                  • Instruction ID: 868aeb0ce9feaf6694dc4b84a0c3550ce90bd9255ed827467382056bb5a991a2
                                                  • Opcode Fuzzy Hash: 1fe10878c5bd0db9fa0ef5a334889de91ade550f43a6e8fe0e7b43a19787d1f7
                                                  • Instruction Fuzzy Hash: B1D01271844509EECB1197D09888DB97FBCF70A301F140866B402A2041E231D754EA65
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 005d552fa7868e675983c44b53b337e0581d970ae8c0660fad21ca9d409d2e3d
                                                  • Instruction ID: 8dbc374746079d658ddfafd6a985f6f78c8152de4eebcab9768456ab43654802
                                                  • Opcode Fuzzy Hash: 005d552fa7868e675983c44b53b337e0581d970ae8c0660fad21ca9d409d2e3d
                                                  • Instruction Fuzzy Hash: F6C15175A0421AEFCB24CF98C884EAEBBB5FF48714B15499AE805DB351E730DD41DB90
                                                  APIs
                                                  • CharLowerBuffW.USER32(?,?), ref: 005FE0BE
                                                  • CharLowerBuffW.USER32(?,?), ref: 005FE101
                                                    • Part of subcall function 005FD7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 005FD7C5
                                                  • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 005FE301
                                                  • _memmove.LIBCMT ref: 005FE314
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: BuffCharLower$AllocVirtual_memmove
                                                  • String ID:
                                                  • API String ID: 3659485706-0
                                                  • Opcode ID: 3b902dad57b2634200e30bdb75333222b46336479afe5ff2621328742de1e709
                                                  • Instruction ID: 292791cb3b51a535835c7f01da16aca3a3d9c03977fc7c1e10c9d96f248eabe6
                                                  • Opcode Fuzzy Hash: 3b902dad57b2634200e30bdb75333222b46336479afe5ff2621328742de1e709
                                                  • Instruction Fuzzy Hash: 2AC187716083068FC704DF28C485A2ABBE4FF89714F04896EF9999B361D735E946CF82
                                                  APIs
                                                  • CoInitialize.OLE32(00000000), ref: 005F80C3
                                                  • CoUninitialize.OLE32 ref: 005F80CE
                                                    • Part of subcall function 005DD56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 005DD5D4
                                                  • VariantInit.OLEAUT32(?), ref: 005F80D9
                                                  • VariantClear.OLEAUT32(?), ref: 005F83AA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                  • String ID:
                                                  • API String ID: 780911581-0
                                                  • Opcode ID: 37d1fcfd6f763cbfaca211b8d81770bb4088e25d60d64d38f6cc0d289e37f07b
                                                  • Instruction ID: c126246d4cc55079b54d53d183c9dc0163e98fbf3cf17a989952d103b467bbf7
                                                  • Opcode Fuzzy Hash: 37d1fcfd6f763cbfaca211b8d81770bb4088e25d60d64d38f6cc0d289e37f07b
                                                  • Instruction Fuzzy Hash: 11A14A756047069FCB10EF54C885B3ABBE4BF89714F184859FA96AB3A1CB34ED05CB81
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Variant$AllocClearCopyInitString
                                                  • String ID:
                                                  • API String ID: 2808897238-0
                                                  • Opcode ID: 8feaa01989f0206e0d22127e3f917f87f23097bd2a027cb4559d47e95df8b7c6
                                                  • Instruction ID: 616f1ae6774c1ed767001437911d843a38f164e5591ebd8eec52bcb10da30001
                                                  • Opcode Fuzzy Hash: 8feaa01989f0206e0d22127e3f917f87f23097bd2a027cb4559d47e95df8b7c6
                                                  • Instruction Fuzzy Hash: 11519374604302DADB34EF69D89563ABBE5BF85310F24981FE5D6EB392DA70D8828701
                                                  APIs
                                                  • GetWindowRect.USER32(00F2E600,?), ref: 00609863
                                                  • ScreenToClient.USER32(00000002,00000002), ref: 00609896
                                                  • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00609903
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Window$ClientMoveRectScreen
                                                  • String ID:
                                                  • API String ID: 3880355969-0
                                                  • Opcode ID: 13d97d1544cadf179d1c7877a6e2cae6078a6a71b15e287d2a1db389644dc732
                                                  • Instruction ID: bcdade8ef0485d9f85aac2c2c05419cbe9b4b0cc176ae0fc7e8cd4cdca5f433e
                                                  • Opcode Fuzzy Hash: 13d97d1544cadf179d1c7877a6e2cae6078a6a71b15e287d2a1db389644dc732
                                                  • Instruction Fuzzy Hash: DB512C34A40209AFCB18DF54C884AEE7BB7FB46360F148559F8659B3A1D731AD41CBA0
                                                  APIs
                                                  • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 005D9AD2
                                                  • __itow.LIBCMT ref: 005D9B03
                                                    • Part of subcall function 005D9D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 005D9DBE
                                                  • SendMessageW.USER32(?,0000110A,00000001,?), ref: 005D9B6C
                                                  • __itow.LIBCMT ref: 005D9BC3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$__itow
                                                  • String ID:
                                                  • API String ID: 3379773720-0
                                                  • Opcode ID: d9ab782fc998e503404130da62fd2624de76a32ccae9447d9c375935970e1ad2
                                                  • Instruction ID: 5c0e940f2d5bb15a86ab07db0a02c6362cb3fb67be602c2a95ea9f11662fd087
                                                  • Opcode Fuzzy Hash: d9ab782fc998e503404130da62fd2624de76a32ccae9447d9c375935970e1ad2
                                                  • Instruction Fuzzy Hash: 1B412E74A04209ABDF21EF54D849BEE7FA9FF89714F10005BF905A7391DB709944CB91
                                                  APIs
                                                  • socket.WSOCK32(00000002,00000002,00000011), ref: 005F69D1
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 005F69E1
                                                    • Part of subcall function 00589837: __itow.LIBCMT ref: 00589862
                                                    • Part of subcall function 00589837: __swprintf.LIBCMT ref: 005898AC
                                                  • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 005F6A45
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 005F6A51
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$__itow__swprintfsocket
                                                  • String ID:
                                                  • API String ID: 2214342067-0
                                                  • Opcode ID: 80f34e720d6faa61655a4c9e643921e02a320e45e74fdf2dc481985c77d99488
                                                  • Instruction ID: acd683d4ca943c44dd64875df9acdb23be0f4aff9a5e72cb55a3f2916f60c888
                                                  • Opcode Fuzzy Hash: 80f34e720d6faa61655a4c9e643921e02a320e45e74fdf2dc481985c77d99488
                                                  • Instruction Fuzzy Hash: 28419475640201AFEB60BF24DC8AF3A7BA4EB44714F448418FE59AF3C2DA749D008B91
                                                  APIs
                                                  • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0060F910), ref: 005F64A7
                                                  • _strlen.LIBCMT ref: 005F64D9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _strlen
                                                  • String ID:
                                                  • API String ID: 4218353326-0
                                                  • Opcode ID: 77d99afb8d897f1ab5b401e2561d2549cd6669dcb49731ba48244ef0b7f78d00
                                                  • Instruction ID: b04f3e19d8e63131629d9a6e94d899c14899cca30ace24427d16e79dba68f588
                                                  • Opcode Fuzzy Hash: 77d99afb8d897f1ab5b401e2561d2549cd6669dcb49731ba48244ef0b7f78d00
                                                  • Instruction Fuzzy Hash: C041A831500109ABCB14FB68DC89EBEBFB9BF84314F548155F915A7292EB34AD04C750
                                                  APIs
                                                  • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 005EB89E
                                                  • GetLastError.KERNEL32(?,00000000), ref: 005EB8C4
                                                  • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 005EB8E9
                                                  • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 005EB915
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CreateHardLink$DeleteErrorFileLast
                                                  • String ID:
                                                  • API String ID: 3321077145-0
                                                  • Opcode ID: f72c119726a7dcc82953e24fad6df2d25c3f467fd3168ad964a39d5678dd136a
                                                  • Instruction ID: e7aa1233720d786b820b1eead8ad3787bd592699e7f74402080bb6e8e740d90b
                                                  • Opcode Fuzzy Hash: f72c119726a7dcc82953e24fad6df2d25c3f467fd3168ad964a39d5678dd136a
                                                  • Instruction Fuzzy Hash: EE411A35600652DFCB14EF15C488A6ABBE1BF89314F098098ED4AAB762CB30FD01DF91
                                                  APIs
                                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 006088DE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: InvalidateRect
                                                  • String ID:
                                                  • API String ID: 634782764-0
                                                  • Opcode ID: 26206dcd671cb44cfbf1608d1d60827b3d7ddab5cf18a407a5890d3be1d0d9ca
                                                  • Instruction ID: c394bd92858d703d2413a0efb84ea1cc5bea7cc968c25daea04f0eaf5d0da556
                                                  • Opcode Fuzzy Hash: 26206dcd671cb44cfbf1608d1d60827b3d7ddab5cf18a407a5890d3be1d0d9ca
                                                  • Instruction Fuzzy Hash: 62319234680118AFEB28EB58CC45BFA7BA7EB06310F544112F995E73E1CE71D9409B96
                                                  APIs
                                                  • ClientToScreen.USER32(?,?), ref: 0060AB60
                                                  • GetWindowRect.USER32(?,?), ref: 0060ABD6
                                                  • PtInRect.USER32(?,?,0060C014), ref: 0060ABE6
                                                  • MessageBeep.USER32(00000000), ref: 0060AC57
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Rect$BeepClientMessageScreenWindow
                                                  • String ID:
                                                  • API String ID: 1352109105-0
                                                  • Opcode ID: ee730604aa5f8761ac424876fc2ef6c905810834f2d232562a168183230f9bcc
                                                  • Instruction ID: 1017ccf98e8bc927b80262da8c39ac82cbeb712aa07c69c81ca62dfb0492aea9
                                                  • Opcode Fuzzy Hash: ee730604aa5f8761ac424876fc2ef6c905810834f2d232562a168183230f9bcc
                                                  • Instruction Fuzzy Hash: 3341A234640218DFDB15DF98C884BAA7BF7FB49380F1990A9E4159B3A1D730E841CB52
                                                  APIs
                                                  • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 005E0B27
                                                  • SetKeyboardState.USER32(00000080,?,00000001), ref: 005E0B43
                                                  • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 005E0BA9
                                                  • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 005E0BFB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: KeyboardState$InputMessagePostSend
                                                  • String ID:
                                                  • API String ID: 432972143-0
                                                  • Opcode ID: 2cd75c3e09d8ed549c819197ce72eedab650246193539204831f4ddac47fcf1d
                                                  • Instruction ID: 5fe205a82f913a9b6a5987b8d1b14c5d3c2e72b4d78704610de2f0710f7c4c90
                                                  • Opcode Fuzzy Hash: 2cd75c3e09d8ed549c819197ce72eedab650246193539204831f4ddac47fcf1d
                                                  • Instruction Fuzzy Hash: 043128309402986AEF398B268C09BFEBFAEBB55314F48525AE4C5511D1C3F589C49751
                                                  APIs
                                                  • GetKeyboardState.USER32(?,7694C0D0,?,00008000), ref: 005E0C66
                                                  • SetKeyboardState.USER32(00000080,?,00008000), ref: 005E0C82
                                                  • PostMessageW.USER32(00000000,00000101,00000000), ref: 005E0CE1
                                                  • SendInput.USER32(00000001,?,0000001C,7694C0D0,?,00008000), ref: 005E0D33
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: KeyboardState$InputMessagePostSend
                                                  • String ID:
                                                  • API String ID: 432972143-0
                                                  • Opcode ID: c1ca5d3278cb2b54efaf289ae019511eb5e519fe29362a2f436e351bd3dd61d3
                                                  • Instruction ID: 65226ed3b1e3e95bb52ba573df142120509e821c16bf4b7c1ef4dc4a8217056e
                                                  • Opcode Fuzzy Hash: c1ca5d3278cb2b54efaf289ae019511eb5e519fe29362a2f436e351bd3dd61d3
                                                  • Instruction Fuzzy Hash: B53157309402886EFF388B6A8C097BEFF66BB45310F14671BE4C9521D1C3B99DC58752
                                                  APIs
                                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 005B61FB
                                                  • __isleadbyte_l.LIBCMT ref: 005B6229
                                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 005B6257
                                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 005B628D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                  • String ID:
                                                  • API String ID: 3058430110-0
                                                  • Opcode ID: 33ca2fd720907a8830cb571ea9889d4f5a6c56587006330660fa7c2d4c9b3806
                                                  • Instruction ID: 5c54897b07851aefa3f94f824a4c4518bcfa5ce5288d4fe1617e1bae6d137ad9
                                                  • Opcode Fuzzy Hash: 33ca2fd720907a8830cb571ea9889d4f5a6c56587006330660fa7c2d4c9b3806
                                                  • Instruction Fuzzy Hash: B831D035600246AFEF218F68CC48BFABFA9FF42310F154428E824971A1E734E950DB90
                                                  APIs
                                                  • GetForegroundWindow.USER32 ref: 00604F02
                                                    • Part of subcall function 005E3641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 005E365B
                                                    • Part of subcall function 005E3641: GetCurrentThreadId.KERNEL32 ref: 005E3662
                                                    • Part of subcall function 005E3641: AttachThreadInput.USER32(00000000,?,005E5005), ref: 005E3669
                                                  • GetCaretPos.USER32(?), ref: 00604F13
                                                  • ClientToScreen.USER32(00000000,?), ref: 00604F4E
                                                  • GetForegroundWindow.USER32 ref: 00604F54
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                  • String ID:
                                                  • API String ID: 2759813231-0
                                                  • Opcode ID: 183d167531602738a5f4b2601fa017a74cad2c51f414fac23016fe1878a73663
                                                  • Instruction ID: 62829fa3bf1f8844b49742e6e3f6ce1e2b1f7edc1f7ebb728f846537019d73d8
                                                  • Opcode Fuzzy Hash: 183d167531602738a5f4b2601fa017a74cad2c51f414fac23016fe1878a73663
                                                  • Instruction Fuzzy Hash: DD312C71D00109AFDB14EFA5C8899EFBBF9FF98304B10406AE855E7241DA719E058BA0
                                                  APIs
                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 005E3C7A
                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 005E3C88
                                                  • Process32NextW.KERNEL32(00000000,?), ref: 005E3CA8
                                                  • CloseHandle.KERNEL32(00000000), ref: 005E3D52
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                  • String ID:
                                                  • API String ID: 420147892-0
                                                  • Opcode ID: 39c140fe2c7b25ff3c483556fb925a7318093fab0501172544624971b6a4e446
                                                  • Instruction ID: 337b5f46023961aec19766e164fd6ce9fb9b0d4fc80a1af8016deaf7cdae6a24
                                                  • Opcode Fuzzy Hash: 39c140fe2c7b25ff3c483556fb925a7318093fab0501172544624971b6a4e446
                                                  • Instruction Fuzzy Hash: EF319E711083469BC314EF11C889AAFBFE8BFD9350F50082CF881961A1EB719A49CB92
                                                  APIs
                                                    • Part of subcall function 00582612: GetWindowLongW.USER32(?,000000EB), ref: 00582623
                                                  • GetCursorPos.USER32(?), ref: 0060C4D2
                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,005BB9AB,?,?,?,?,?), ref: 0060C4E7
                                                  • GetCursorPos.USER32(?), ref: 0060C534
                                                  • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,005BB9AB,?,?,?), ref: 0060C56E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                  • String ID:
                                                  • API String ID: 2864067406-0
                                                  • Opcode ID: 147871e37e2992ab1c0e5bb3f367410163dffec37b10040bf451445c68babced
                                                  • Instruction ID: 2e1cd569aab969a3a4437463387c9481beac0cb7f7d92fcef88934d58b8256dc
                                                  • Opcode Fuzzy Hash: 147871e37e2992ab1c0e5bb3f367410163dffec37b10040bf451445c68babced
                                                  • Instruction Fuzzy Hash: A6318139540018AFCB2ADF58CC58EEB7BB6EB49320F444165F9059B3A1CB31A961DBA4
                                                  APIs
                                                    • Part of subcall function 005D810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 005D8121
                                                    • Part of subcall function 005D810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 005D812B
                                                    • Part of subcall function 005D810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 005D813A
                                                    • Part of subcall function 005D810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 005D8141
                                                    • Part of subcall function 005D810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 005D8157
                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 005D86A3
                                                  • _memcmp.LIBCMT ref: 005D86C6
                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005D86FC
                                                  • HeapFree.KERNEL32(00000000), ref: 005D8703
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                  • String ID:
                                                  • API String ID: 1592001646-0
                                                  • Opcode ID: 755e3d1a7068131130c0bc4a01d19f90ac518a1afc9f78c5e649ed741bdff372
                                                  • Instruction ID: a3ece7f80dcfabb1ccea7a9eee601512fea8506f90db91878d5e17bceef6c440
                                                  • Opcode Fuzzy Hash: 755e3d1a7068131130c0bc4a01d19f90ac518a1afc9f78c5e649ed741bdff372
                                                  • Instruction Fuzzy Hash: C4216B71E40209EBDB20DFA8C949BFEBBB9FF54355F15405AE444AB241EB31AE05CB50
                                                  APIs
                                                  • __setmode.LIBCMT ref: 005A09AE
                                                    • Part of subcall function 00585A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,005E7896,?,?,00000000), ref: 00585A2C
                                                    • Part of subcall function 00585A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,005E7896,?,?,00000000,?,?), ref: 00585A50
                                                  • _fprintf.LIBCMT ref: 005A09E5
                                                  • OutputDebugStringW.KERNEL32(?), ref: 005D5DBB
                                                    • Part of subcall function 005A4AAA: _flsall.LIBCMT ref: 005A4AC3
                                                  • __setmode.LIBCMT ref: 005A0A1A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                  • String ID:
                                                  • API String ID: 521402451-0
                                                  • Opcode ID: 74f31fe97b620b2dfa3d830f31aa4e185cb984a54fc23d84e9887b2034cd132b
                                                  • Instruction ID: 55077757369c342f68d342139a39327dec567f9ba90fac99ea5e32d75886200b
                                                  • Opcode Fuzzy Hash: 74f31fe97b620b2dfa3d830f31aa4e185cb984a54fc23d84e9887b2034cd132b
                                                  • Instruction Fuzzy Hash: 401102319042066FDB04B7F8AC8F9BE7FA9BFC7320F240116F50567182EEA159469BA1
                                                  APIs
                                                  • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 005F17A3
                                                    • Part of subcall function 005F182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 005F184C
                                                    • Part of subcall function 005F182D: InternetCloseHandle.WININET(00000000), ref: 005F18E9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Internet$CloseConnectHandleOpen
                                                  • String ID:
                                                  • API String ID: 1463438336-0
                                                  • Opcode ID: c0a85e8c8f5dfc16cba39b44912f5ff4b408cc3edbbe459d0920f5bcc5b8e70c
                                                  • Instruction ID: 12e521785a79c575b32206af796bdbd8d61d9038985f18fad172d0be3968e6b3
                                                  • Opcode Fuzzy Hash: c0a85e8c8f5dfc16cba39b44912f5ff4b408cc3edbbe459d0920f5bcc5b8e70c
                                                  • Instruction Fuzzy Hash: E821B071240A09FBEB129F609C04BBBBFAAFF88750F14442AFA0596550DB79981197A4
                                                  APIs
                                                  • GetFileAttributesW.KERNEL32(?,0060FAC0), ref: 005E3A64
                                                  • GetLastError.KERNEL32 ref: 005E3A73
                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 005E3A82
                                                  • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0060FAC0), ref: 005E3ADF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CreateDirectory$AttributesErrorFileLast
                                                  • String ID:
                                                  • API String ID: 2267087916-0
                                                  • Opcode ID: 0246ba0ccc9aacf82232513c31e7d7205e89e4a4b73f493154c49ae17ce1f702
                                                  • Instruction ID: 31a1e6e187ed6d0d7d5c0ee1d10e85f04de79f07501d0e2c0b41a1f6029f5019
                                                  • Opcode Fuzzy Hash: 0246ba0ccc9aacf82232513c31e7d7205e89e4a4b73f493154c49ae17ce1f702
                                                  • Instruction Fuzzy Hash: 752194345482459FC314EF29C88986B7FE8BE59364F104A29F4D9D72A1D731DE85CB82
                                                  APIs
                                                  • _free.LIBCMT ref: 005B5101
                                                    • Part of subcall function 005A571C: __FF_MSGBANNER.LIBCMT ref: 005A5733
                                                    • Part of subcall function 005A571C: __NMSG_WRITE.LIBCMT ref: 005A573A
                                                    • Part of subcall function 005A571C: RtlAllocateHeap.NTDLL(00F10000,00000000,00000001,00000000,?,?,?,005A0DD3,?), ref: 005A575F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: AllocateHeap_free
                                                  • String ID:
                                                  • API String ID: 614378929-0
                                                  • Opcode ID: e406256638b1281b2ccc2f9763a2b9565dc2645879bd3b148311d60efbf3fd55
                                                  • Instruction ID: 18c14aa7e0d64a4ff75901a533ebfa6dd580990c7320431ba845ddc059605b78
                                                  • Opcode Fuzzy Hash: e406256638b1281b2ccc2f9763a2b9565dc2645879bd3b148311d60efbf3fd55
                                                  • Instruction Fuzzy Hash: C9110A71904A16AECF392F78BC097AE3F98BF46361F204929FA8496151FE31A940C790
                                                  APIs
                                                  • _memset.LIBCMT ref: 005844CF
                                                    • Part of subcall function 0058407C: _memset.LIBCMT ref: 005840FC
                                                    • Part of subcall function 0058407C: _wcscpy.LIBCMT ref: 00584150
                                                    • Part of subcall function 0058407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00584160
                                                  • KillTimer.USER32(?,00000001,?,?), ref: 00584524
                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00584533
                                                  • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 005BD4B9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                  • String ID:
                                                  • API String ID: 1378193009-0
                                                  • Opcode ID: a7d2c88cfc4a14d561d70a63d030d0ac9664fa08b98a657271ed8fb62dcd45e0
                                                  • Instruction ID: dab7180bbfb0ea1ea49f536e895a370694f813103af493c78f6ae504f96a08eb
                                                  • Opcode Fuzzy Hash: a7d2c88cfc4a14d561d70a63d030d0ac9664fa08b98a657271ed8fb62dcd45e0
                                                  • Instruction Fuzzy Hash: 8321DA745047949FEB329B249859BEBBFFCBF05314F04049DEA9E56142D3B42A84CB52
                                                  APIs
                                                    • Part of subcall function 00585A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,005E7896,?,?,00000000), ref: 00585A2C
                                                    • Part of subcall function 00585A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,005E7896,?,?,00000000,?,?), ref: 00585A50
                                                  • gethostbyname.WSOCK32(?), ref: 005F6399
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 005F63A4
                                                  • _memmove.LIBCMT ref: 005F63D1
                                                  • inet_ntoa.WSOCK32(?), ref: 005F63DC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                  • String ID:
                                                  • API String ID: 1504782959-0
                                                  • Opcode ID: c3acb38068edcfd96136cbe95ce58f2e40510c2b863b9d3a034e930cc82d6f46
                                                  • Instruction ID: e917e509f78e3c84ee6a17a2d2d8783381f30c1d46f6ff5895636c2ef86c857b
                                                  • Opcode Fuzzy Hash: c3acb38068edcfd96136cbe95ce58f2e40510c2b863b9d3a034e930cc82d6f46
                                                  • Instruction Fuzzy Hash: 6D11333550010AAFCB04FBA4DD8ACFE7BB9BF48311B544465F905B7161EB319E14DB61
                                                  APIs
                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 005D8B61
                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 005D8B73
                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 005D8B89
                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 005D8BA4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 19bd619142dfb5d9606a9104789d5cd673ef1522520e0e8070cc00a7369ab75a
                                                  • Instruction ID: 09f49111e341d28f20f83c26c8abf5d8fb87fec971458fdb332cf0ee1cb55bd2
                                                  • Opcode Fuzzy Hash: 19bd619142dfb5d9606a9104789d5cd673ef1522520e0e8070cc00a7369ab75a
                                                  • Instruction Fuzzy Hash: 05115E79900218FFEB10DFA9CC84FADBB74FB48710F204096E900B7250DA716E11DB94
                                                  APIs
                                                    • Part of subcall function 00582612: GetWindowLongW.USER32(?,000000EB), ref: 00582623
                                                  • DefDlgProcW.USER32(?,00000020,?), ref: 005812D8
                                                  • GetClientRect.USER32(?,?), ref: 005BB5FB
                                                  • GetCursorPos.USER32(?), ref: 005BB605
                                                  • ScreenToClient.USER32(?,?), ref: 005BB610
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Client$CursorLongProcRectScreenWindow
                                                  • String ID:
                                                  • API String ID: 4127811313-0
                                                  • Opcode ID: 2792942be2a567a5eadd878434066e8672de8082334f6e9ed212e7c41eec35e0
                                                  • Instruction ID: 43ec90c068c93edbdea9f64fd10e6dfc825fd697973aaaa01bf4eb96ae72d4a0
                                                  • Opcode Fuzzy Hash: 2792942be2a567a5eadd878434066e8672de8082334f6e9ed212e7c41eec35e0
                                                  • Instruction Fuzzy Hash: 0F113A3950051AEFCB10EF99D8899FE7BB9FB45310F400456FA42E7141D730BA528BA9
                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 005DD84D
                                                  • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 005DD864
                                                  • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 005DD879
                                                  • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 005DD897
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Type$Register$FileLoadModuleNameUser
                                                  • String ID:
                                                  • API String ID: 1352324309-0
                                                  • Opcode ID: 2dc4bba537fc99efc664e2604efac37cc226e335f6e09b9a87c08394bca3bc87
                                                  • Instruction ID: f54beb75f90486b3ad4c0c810277c0782e98b42483df241943942ac827bd7e38
                                                  • Opcode Fuzzy Hash: 2dc4bba537fc99efc664e2604efac37cc226e335f6e09b9a87c08394bca3bc87
                                                  • Instruction Fuzzy Hash: 06115E75645304DBE3318F58EC48F93BBBCFB00B00F10896BA916D6651D7B0E549ABB1
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                  • String ID:
                                                  • API String ID: 3016257755-0
                                                  • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                  • Instruction ID: 9044b5d2ecdf3ec29ac86b969e07ab9340f977deaf987bbd4ca77bd166a814e9
                                                  • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                  • Instruction Fuzzy Hash: 46014E7244814EBBCF166E84CC09CED3F62BB9C350F598416FA1858031D236E9B1AF81
                                                  APIs
                                                  • GetWindowRect.USER32(?,?), ref: 0060B2E4
                                                  • ScreenToClient.USER32(?,?), ref: 0060B2FC
                                                  • ScreenToClient.USER32(?,?), ref: 0060B320
                                                  • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0060B33B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ClientRectScreen$InvalidateWindow
                                                  • String ID:
                                                  • API String ID: 357397906-0
                                                  • Opcode ID: 01c75600bc7fdc95ba9b6bef994ee23d8f34521451637bdc348d2b72a2cad812
                                                  • Instruction ID: 3a306b2605426271c717eed61fb871c42df758587793856e143fddf2b27dfd6e
                                                  • Opcode Fuzzy Hash: 01c75600bc7fdc95ba9b6bef994ee23d8f34521451637bdc348d2b72a2cad812
                                                  • Instruction Fuzzy Hash: 141144B9D40209EFDB51CFA9C8849EEBBF9FF08310F109166E914E3620D735AA558F50
                                                  APIs
                                                  • EnterCriticalSection.KERNEL32(?), ref: 005E6BE6
                                                    • Part of subcall function 005E76C4: _memset.LIBCMT ref: 005E76F9
                                                  • _memmove.LIBCMT ref: 005E6C09
                                                  • _memset.LIBCMT ref: 005E6C16
                                                  • LeaveCriticalSection.KERNEL32(?), ref: 005E6C26
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CriticalSection_memset$EnterLeave_memmove
                                                  • String ID:
                                                  • API String ID: 48991266-0
                                                  • Opcode ID: a09909007cdc7e9e2554dfd6969fbdcaa850192d5dbdc4e208183d7973ec5c37
                                                  • Instruction ID: 0c8ae1a5b6f6c55ced57fe1afeea5474a71d5e580e03670afee9694d2d1ee4d2
                                                  • Opcode Fuzzy Hash: a09909007cdc7e9e2554dfd6969fbdcaa850192d5dbdc4e208183d7973ec5c37
                                                  • Instruction Fuzzy Hash: B2F0543A100100ABCF056F95DC89A4ABF2AFF85320F048061FE085E267C732E911DBB4
                                                  APIs
                                                  • GetSysColor.USER32(00000008), ref: 00582231
                                                  • SetTextColor.GDI32(?,000000FF), ref: 0058223B
                                                  • SetBkMode.GDI32(?,00000001), ref: 00582250
                                                  • GetStockObject.GDI32(00000005), ref: 00582258
                                                  • GetWindowDC.USER32(?,00000000), ref: 005BBE83
                                                  • GetPixel.GDI32(00000000,00000000,00000000), ref: 005BBE90
                                                  • GetPixel.GDI32(00000000,?,00000000), ref: 005BBEA9
                                                  • GetPixel.GDI32(00000000,00000000,?), ref: 005BBEC2
                                                  • GetPixel.GDI32(00000000,?,?), ref: 005BBEE2
                                                  • ReleaseDC.USER32(?,00000000), ref: 005BBEED
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                  • String ID:
                                                  • API String ID: 1946975507-0
                                                  • Opcode ID: 0023a82d5e372aa1f0a5e2826c7b06e65068bff1347b2d36aadfbc35bed6b444
                                                  • Instruction ID: 7c1a4ceb33c31adc0806e2cfc160697198dbd687125f198edd7193113a704c6a
                                                  • Opcode Fuzzy Hash: 0023a82d5e372aa1f0a5e2826c7b06e65068bff1347b2d36aadfbc35bed6b444
                                                  • Instruction Fuzzy Hash: A8E03932144244AAEB215F64EC0D7D93F12EB16332F0083A6FA69584E187B24990DB12
                                                  APIs
                                                  • GetCurrentThread.KERNEL32 ref: 005D871B
                                                  • OpenThreadToken.ADVAPI32(00000000,?,?,?,005D82E6), ref: 005D8722
                                                  • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,005D82E6), ref: 005D872F
                                                  • OpenProcessToken.ADVAPI32(00000000,?,?,?,005D82E6), ref: 005D8736
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CurrentOpenProcessThreadToken
                                                  • String ID:
                                                  • API String ID: 3974789173-0
                                                  • Opcode ID: 29e6e9e0fee2825bd05329fd20ba73365cb8d7e21c66a2ab6a46dc2cb1b7d843
                                                  • Instruction ID: ed13731593d4e9f174a9cf25dcb5ada641d63179067600fbcedaf101945b2da5
                                                  • Opcode Fuzzy Hash: 29e6e9e0fee2825bd05329fd20ba73365cb8d7e21c66a2ab6a46dc2cb1b7d843
                                                  • Instruction Fuzzy Hash: BAE086366512119BDB305FF45D0CF573BADEF50791F148829B246C9040DA348441C750
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: %a
                                                  • API String ID: 0-913774005
                                                  • Opcode ID: 97a2790fb7ed6e7fa335c285bf64921980c403d49d744f40a6e0b3b597f3291f
                                                  • Instruction ID: 189cbb448b4ef4f35e7f938514e6a6cb206658bb42d70f6daed58b9dc3f08d6f
                                                  • Opcode Fuzzy Hash: 97a2790fb7ed6e7fa335c285bf64921980c403d49d744f40a6e0b3b597f3291f
                                                  • Instruction Fuzzy Hash: 98B17D7590010A9BCF14FB94C8899FEBFB9FB48310F644426ED12B7191EB349A81CB91
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: __itow_s
                                                  • String ID: xbd$xbd
                                                  • API String ID: 3653519197-63148811
                                                  • Opcode ID: ab0fc12d7f281fb11f91265f4df415e06bd44e3e2d48bb8439d57f0100bb7771
                                                  • Instruction ID: 3b0c97abdf501e1ca90414fe009fda6d46d338e5d7cf6283fa40aa87a5c5801f
                                                  • Opcode Fuzzy Hash: ab0fc12d7f281fb11f91265f4df415e06bd44e3e2d48bb8439d57f0100bb7771
                                                  • Instruction Fuzzy Hash: 8FB19274A0010AEFDB14EF54C894DBABFB9FF49300F148459FA45AB291EB74E941CB61
                                                  APIs
                                                    • Part of subcall function 0059FC86: _wcscpy.LIBCMT ref: 0059FCA9
                                                    • Part of subcall function 00589837: __itow.LIBCMT ref: 00589862
                                                    • Part of subcall function 00589837: __swprintf.LIBCMT ref: 005898AC
                                                  • __wcsnicmp.LIBCMT ref: 005EB02D
                                                  • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 005EB0F6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                  • String ID: LPT
                                                  • API String ID: 3222508074-1350329615
                                                  • Opcode ID: c0007036dad73d9fce99fbbc506f73225708eaf570631b7f25478a581168c763
                                                  • Instruction ID: 4dadb322b56cc4201c87bfae990829fb7ccf7e377c55deba8324767cdb936c37
                                                  • Opcode Fuzzy Hash: c0007036dad73d9fce99fbbc506f73225708eaf570631b7f25478a581168c763
                                                  • Instruction Fuzzy Hash: 19619071A00216AFDB18EF95C895EAFBBB4FF48310F044069F956AB291D730AE44CB90
                                                  APIs
                                                  • Sleep.KERNEL32(00000000), ref: 00592968
                                                  • GlobalMemoryStatusEx.KERNEL32(?), ref: 00592981
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: GlobalMemorySleepStatus
                                                  • String ID: @
                                                  • API String ID: 2783356886-2766056989
                                                  • Opcode ID: 13bdc7145d21479130169e6cf61708ba6b6be9d8eb31340ce9bf48eb642fef04
                                                  • Instruction ID: d088a247227bc95b1b430effb3d12209984bd2ff1109322d6e449680619809bd
                                                  • Opcode Fuzzy Hash: 13bdc7145d21479130169e6cf61708ba6b6be9d8eb31340ce9bf48eb642fef04
                                                  • Instruction Fuzzy Hash: CC513472408B459BD320EF10D88ABABBBECFBC5344F81885DF6D9510A1DF308569CB66
                                                  APIs
                                                    • Part of subcall function 00584F0B: __fread_nolock.LIBCMT ref: 00584F29
                                                  • _wcscmp.LIBCMT ref: 005E9824
                                                  • _wcscmp.LIBCMT ref: 005E9837
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: _wcscmp$__fread_nolock
                                                  • String ID: FILE
                                                  • API String ID: 4029003684-3121273764
                                                  • Opcode ID: 418687e6d6e985eb34177fcc2ab1bfcb0a9c27b8ea2ee700c84cc66fb56b24e5
                                                  • Instruction ID: 52d2415fff16345610dbffd4e86fd89050d7ddcf80aeb7c9a8b76019da00b908
                                                  • Opcode Fuzzy Hash: 418687e6d6e985eb34177fcc2ab1bfcb0a9c27b8ea2ee700c84cc66fb56b24e5
                                                  • Instruction Fuzzy Hash: EB41C771A0024BBADF24AAA5CC49FEFBFBDEF86710F004469F904B7180D6719904CB61
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ClearVariant
                                                  • String ID: Ddd$Ddd
                                                  • API String ID: 1473721057-3245474882
                                                  • Opcode ID: 4c14c12c8e027b3f123f17310f6ef77ebd6512a10a4a089e7a48ea00eba1aa01
                                                  • Instruction ID: a04ae3cc3214b609d2bc9553fb26d6fb6a58131f20cfec8fea140bbad149bc70
                                                  • Opcode Fuzzy Hash: 4c14c12c8e027b3f123f17310f6ef77ebd6512a10a4a089e7a48ea00eba1aa01
                                                  • Instruction Fuzzy Hash: 5F510378604341DFEB64DF18C484A1ABBF2BB99354F54981DF9859B361D331E881CF42
                                                  APIs
                                                  • _memset.LIBCMT ref: 005F259E
                                                  • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 005F25D4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CrackInternet_memset
                                                  • String ID: |
                                                  • API String ID: 1413715105-2343686810
                                                  • Opcode ID: 9382ed0bc3187792e5246a27730ceb51277f48ed50efd2317d703dee764414ef
                                                  • Instruction ID: 5eb935a1428aad7a66afbdd7b9c913db577cf3f69a92071144ba81fa22ba0d5e
                                                  • Opcode Fuzzy Hash: 9382ed0bc3187792e5246a27730ceb51277f48ed50efd2317d703dee764414ef
                                                  • Instruction Fuzzy Hash: 1D31F97180411EABCF11AFA4CC89EEEBFB9FF48310F100069FD15B6162EA359956DB60
                                                  APIs
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00607B61
                                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00607B76
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID: '
                                                  • API String ID: 3850602802-1997036262
                                                  • Opcode ID: 3ae9c04ccd2181cab197b74e43d3086d37b986c9e1d536cf989e436a316f7154
                                                  • Instruction ID: 8b86dbeb9b8f5b43ee21a5510cd3eeb2de3192bf0acd54aafd91680190a923aa
                                                  • Opcode Fuzzy Hash: 3ae9c04ccd2181cab197b74e43d3086d37b986c9e1d536cf989e436a316f7154
                                                  • Instruction Fuzzy Hash: AB41F874E4520A9FDB54CF64C981BDABBB6FB09300F10416AE905AB391D771A951CFA0
                                                  APIs
                                                  • DestroyWindow.USER32(?,?,?,?), ref: 00606B17
                                                  • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00606B53
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Window$DestroyMove
                                                  • String ID: static
                                                  • API String ID: 2139405536-2160076837
                                                  • Opcode ID: 5a7365cfe028dc528e488294e05cb2cd9023037335b5283d2bf10a33ea6d3939
                                                  • Instruction ID: 710c4cd9a78524211d39e4711264e9b93ad8afe8720bce1fba02f1d661b808e2
                                                  • Opcode Fuzzy Hash: 5a7365cfe028dc528e488294e05cb2cd9023037335b5283d2bf10a33ea6d3939
                                                  • Instruction Fuzzy Hash: 3C31AF71240604AEDB14AF64CC80BFB77AAFF48764F109619F9A5D7290DB31ACA1CB60
                                                  APIs
                                                  • _memset.LIBCMT ref: 005E2911
                                                  • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 005E294C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: InfoItemMenu_memset
                                                  • String ID: 0
                                                  • API String ID: 2223754486-4108050209
                                                  • Opcode ID: 13ac9fbbfea3742930609088279fd11efdc35329cb8f22bc6a14c7d374049642
                                                  • Instruction ID: 306c56c30a78b0f2bb65f04f5b9dbfa431cbd0f536b8c40374f587ef1b9f7ee1
                                                  • Opcode Fuzzy Hash: 13ac9fbbfea3742930609088279fd11efdc35329cb8f22bc6a14c7d374049642
                                                  • Instruction Fuzzy Hash: A831B4719003499BDB2CCF5ACC45BAEBFADFF45350F142019E9C5E61A6DB709980CB51
                                                  APIs
                                                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00606761
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0060676C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID: Combobox
                                                  • API String ID: 3850602802-2096851135
                                                  • Opcode ID: d78cf34a53b6dc566e2dd16dc0db83ed139bcebadd602608fb8a4f28f2c21ef9
                                                  • Instruction ID: 7468081b399d49f813021abbad8a4bcade93d2160978ee0d73c04eee23c92a63
                                                  • Opcode Fuzzy Hash: d78cf34a53b6dc566e2dd16dc0db83ed139bcebadd602608fb8a4f28f2c21ef9
                                                  • Instruction Fuzzy Hash: 4411B675280209AFEF159F54CC80EEB376BEB44368F104129F914972D0D671DC6187A0
                                                  APIs
                                                    • Part of subcall function 00581D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00581D73
                                                    • Part of subcall function 00581D35: GetStockObject.GDI32(00000011), ref: 00581D87
                                                    • Part of subcall function 00581D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00581D91
                                                  • GetWindowRect.USER32(00000000,?), ref: 00606C71
                                                  • GetSysColor.USER32(00000012), ref: 00606C8B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                  • String ID: static
                                                  • API String ID: 1983116058-2160076837
                                                  • Opcode ID: 4edfec9d6474f037d740878af22b0640965665ca359d17ecb76de442d4746f85
                                                  • Instruction ID: b7fceb31c9cdc856e6e449924a26a4660a5218f31cc279f8ace9740dac6ad614
                                                  • Opcode Fuzzy Hash: 4edfec9d6474f037d740878af22b0640965665ca359d17ecb76de442d4746f85
                                                  • Instruction Fuzzy Hash: 6021297255020AAFDF18DFA8CC45AFA7BA9FB08314F005629FD95D2290D635E861DB60
                                                  APIs
                                                  • GetWindowTextLengthW.USER32(00000000), ref: 006069A2
                                                  • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 006069B1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: LengthMessageSendTextWindow
                                                  • String ID: edit
                                                  • API String ID: 2978978980-2167791130
                                                  • Opcode ID: daa86b2b5f6ca01c7d99b7c696ead0a063370373249a23d59bb8239b41475585
                                                  • Instruction ID: fccc337883283a23f89e5ffddcddc5cfd78d1f66198f81526e02e6d68c2ac0f7
                                                  • Opcode Fuzzy Hash: daa86b2b5f6ca01c7d99b7c696ead0a063370373249a23d59bb8239b41475585
                                                  • Instruction Fuzzy Hash: 4E11BC7118020AABEB148F64DC44EEB3BABEB05378F504724F9A5976E0C771DC619BA0
                                                  APIs
                                                  • _memset.LIBCMT ref: 005E2A22
                                                  • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 005E2A41
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: InfoItemMenu_memset
                                                  • String ID: 0
                                                  • API String ID: 2223754486-4108050209
                                                  • Opcode ID: 9cc1f2337678552f2d1a334dea8f73ed2150d9c5a38934b8e33e407bba30dd5c
                                                  • Instruction ID: d8782e6aee8d5a7ea240effb6c9a5a60241f2a86226dcd0ce0611e104074d6b8
                                                  • Opcode Fuzzy Hash: 9cc1f2337678552f2d1a334dea8f73ed2150d9c5a38934b8e33e407bba30dd5c
                                                  • Instruction Fuzzy Hash: 32112232900194ABCB38DF99DC44BAA7BBDBB46300F045035E8D5E7294DBB0AD0AC791
                                                  APIs
                                                  • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 005F222C
                                                  • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 005F2255
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Internet$OpenOption
                                                  • String ID: <local>
                                                  • API String ID: 942729171-4266983199
                                                  • Opcode ID: ed9dfe40263aa3f35d5a6a287a83c835c3a46c4731f5407ee5b41e03ced7d8f5
                                                  • Instruction ID: ce91fd1f3355297f3d07d26fb764741c729aecd9886a8c18536a3592c238e2ac
                                                  • Opcode Fuzzy Hash: ed9dfe40263aa3f35d5a6a287a83c835c3a46c4731f5407ee5b41e03ced7d8f5
                                                  • Instruction Fuzzy Hash: 561102B4541229BAEB258F518C95EFBFFA8FF06351F10862AFA0546040D3745881DAF1
                                                  APIs
                                                  • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00583C14,006452F8,?,?,?), ref: 0059096E
                                                    • Part of subcall function 00587BCC: _memmove.LIBCMT ref: 00587C06
                                                  • _wcscat.LIBCMT ref: 005C4CB7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: FullNamePath_memmove_wcscat
                                                  • String ID: Sd
                                                  • API String ID: 257928180-1064845130
                                                  • Opcode ID: 223de92e6912f83ce7ede3ce79f17ef9d1078627568febc632d3f49272205994
                                                  • Instruction ID: d1b94e2dd8f2b10e1d787ac3db4e976aef803c6d67e200282e996a6c5ec2e6b0
                                                  • Opcode Fuzzy Hash: 223de92e6912f83ce7ede3ce79f17ef9d1078627568febc632d3f49272205994
                                                  • Instruction Fuzzy Hash: 4C11A531A0521A9FCF51FFA4C80AEDD7FE9FF48350F1058A5B949D3182EA70DA845B14
                                                  APIs
                                                    • Part of subcall function 00587DE1: _memmove.LIBCMT ref: 00587E22
                                                    • Part of subcall function 005DAA99: GetClassNameW.USER32(?,?,000000FF), ref: 005DAABC
                                                  • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 005D8E73
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ClassMessageNameSend_memmove
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 372448540-1403004172
                                                  • Opcode ID: c7aa354222d165c8ae506c7b1b1486a2e00f0cb75c744b2397c32ee5ab15b113
                                                  • Instruction ID: f00c96fddea379ae17becf5c745283719230b8322e22e4bfcb288009ec8a16fb
                                                  • Opcode Fuzzy Hash: c7aa354222d165c8ae506c7b1b1486a2e00f0cb75c744b2397c32ee5ab15b113
                                                  • Instruction Fuzzy Hash: 2A01F5B160121AABCB24FBA8CC498FE7B69FF85320B500A1BF861673D1EE315808C750
                                                  APIs
                                                    • Part of subcall function 00587DE1: _memmove.LIBCMT ref: 00587E22
                                                    • Part of subcall function 005DAA99: GetClassNameW.USER32(?,?,000000FF), ref: 005DAABC
                                                  • SendMessageW.USER32(?,00000180,00000000,?), ref: 005D8D6B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ClassMessageNameSend_memmove
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 372448540-1403004172
                                                  • Opcode ID: d2ebcf8e7354c702409a89afa9d7345641cd011367452f60718504a9884adcb4
                                                  • Instruction ID: 15864a72a2a386972af0be11cdfba79d4850db6876fc13cfb14d51f97ce7cf84
                                                  • Opcode Fuzzy Hash: d2ebcf8e7354c702409a89afa9d7345641cd011367452f60718504a9884adcb4
                                                  • Instruction Fuzzy Hash: 5101D871641109ABCB24F7A4C956AFF7BA9AF55300F500417B802732D1DE219E08D3B1
                                                  APIs
                                                    • Part of subcall function 00587DE1: _memmove.LIBCMT ref: 00587E22
                                                    • Part of subcall function 005DAA99: GetClassNameW.USER32(?,?,000000FF), ref: 005DAABC
                                                  • SendMessageW.USER32(?,00000182,?,00000000), ref: 005D8DEE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ClassMessageNameSend_memmove
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 372448540-1403004172
                                                  • Opcode ID: 9bcf59fbf2c2c7b2143c0be34c63227f0f1258cdc44dc86cdb30501ffba8b642
                                                  • Instruction ID: 8ec603a9237360af98f384f1c95ee94f7db58780b0733760335b801cc7146849
                                                  • Opcode Fuzzy Hash: 9bcf59fbf2c2c7b2143c0be34c63227f0f1258cdc44dc86cdb30501ffba8b642
                                                  • Instruction Fuzzy Hash: AB01A7B1A4110AA7DB31F7A8C946AFF7BA9AF15300F540517B845733D1DE219E08D371
                                                  APIs
                                                  • VariantInit.OLEAUT32(?), ref: 005DC534
                                                    • Part of subcall function 005DC816: _memmove.LIBCMT ref: 005DC860
                                                    • Part of subcall function 005DC816: VariantInit.OLEAUT32(00000000), ref: 005DC882
                                                    • Part of subcall function 005DC816: VariantCopy.OLEAUT32(00000000,?), ref: 005DC88C
                                                  • VariantClear.OLEAUT32(?), ref: 005DC556
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Variant$Init$ClearCopy_memmove
                                                  • String ID: d}c
                                                  • API String ID: 2932060187-4273311159
                                                  • Opcode ID: 54de290a802388cf4fc0b459829088d6728d704e363525bed037ec8787913f15
                                                  • Instruction ID: d6347b37e754624c17edc53f36c12e7d119157778b8b61b62f57e4d98a08245e
                                                  • Opcode Fuzzy Hash: 54de290a802388cf4fc0b459829088d6728d704e363525bed037ec8787913f15
                                                  • Instruction Fuzzy Hash: 2511FEB19007099FC720DF99D88489ABBF8FF08314B50856FE98A97611D771AA44CB90
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: ClassName_wcscmp
                                                  • String ID: #32770
                                                  • API String ID: 2292705959-463685578
                                                  • Opcode ID: 24edded40408414bd6c2a183a5fb6e0799265d006e5cf84c6715393fa47d7c83
                                                  • Instruction ID: 66e0278574a1c9a749573093a2e1e678c2cf97ef812b7a9ca4452730494e6df9
                                                  • Opcode Fuzzy Hash: 24edded40408414bd6c2a183a5fb6e0799265d006e5cf84c6715393fa47d7c83
                                                  • Instruction Fuzzy Hash: AEE0D1329003292BD7209B59EC49FE7FBACEB46B71F010057FD04D3151D5609B4587D1
                                                  APIs
                                                    • Part of subcall function 005BB314: _memset.LIBCMT ref: 005BB321
                                                    • Part of subcall function 005A0940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,005BB2F0,?,?,?,0058100A), ref: 005A0945
                                                  • IsDebuggerPresent.KERNEL32(?,?,?,0058100A), ref: 005BB2F4
                                                  • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0058100A), ref: 005BB303
                                                  Strings
                                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 005BB2FE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                  • API String ID: 3158253471-631824599
                                                  • Opcode ID: 02175cfa1d826941fc8176d184a1e8810ef86da0c05343258306e699651a312d
                                                  • Instruction ID: f9c7605cc7bd12f1c5a6333d8b027ab74693893d3ebbe2621e35718c0668c81a
                                                  • Opcode Fuzzy Hash: 02175cfa1d826941fc8176d184a1e8810ef86da0c05343258306e699651a312d
                                                  • Instruction Fuzzy Hash: F1E06D702007128FE7609F28E4083877EE4BF00314F119E2DE496C7641E7F4E444CBA1
                                                  APIs
                                                  • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 005D7C82
                                                    • Part of subcall function 005A3358: _doexit.LIBCMT ref: 005A3362
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Message_doexit
                                                  • String ID: AutoIt$Error allocating memory.
                                                  • API String ID: 1993061046-4017498283
                                                  • Opcode ID: f19fac428bf6f3c56f3dd4c0109ccbec5fadc8bc9e5ee37120b607d271d17e3b
                                                  • Instruction ID: ae5a990e30ae9a7cae734a03c5c149a5beb1a7287282d2a370c2546570cdaa40
                                                  • Opcode Fuzzy Hash: f19fac428bf6f3c56f3dd4c0109ccbec5fadc8bc9e5ee37120b607d271d17e3b
                                                  • Instruction Fuzzy Hash: 1ED0C2323D831836D22032A86C0ABCA2E499B06B12F040412BF045D5D349D2488082E4
                                                  APIs
                                                  • GetSystemDirectoryW.KERNEL32(?), ref: 005C1775
                                                    • Part of subcall function 005FBFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,005C195E,?), ref: 005FBFFE
                                                    • Part of subcall function 005FBFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 005FC010
                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 005C196D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                  • String ID: WIN_XPe
                                                  • API String ID: 582185067-3257408948
                                                  • Opcode ID: 96cd7ec2cfb900452219e362c0f80548769f0d8c99e1cb6ca87f2e9463623357
                                                  • Instruction ID: d5ae99a19c78ba925a7ddf46e3679433aab3a941719c6630ec5c356666a9157c
                                                  • Opcode Fuzzy Hash: 96cd7ec2cfb900452219e362c0f80548769f0d8c99e1cb6ca87f2e9463623357
                                                  • Instruction Fuzzy Hash: D5F0A570804109DFDB26DBA5C998BEDBEF8FB09301F541499E102A2091DB755E84DFA5
                                                  APIs
                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0060596E
                                                  • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00605981
                                                    • Part of subcall function 005E5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 005E52BC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: FindMessagePostSleepWindow
                                                  • String ID: Shell_TrayWnd
                                                  • API String ID: 529655941-2988720461
                                                  • Opcode ID: f6fde58305ba36d0f8fef869f7c9f31ae0ac6bdb45d9d84c32e814425d4b9512
                                                  • Instruction ID: 303eb3dccdf1b84fced0e4b5705b707eaf316a4f702b9a7047b92942cb1a738e
                                                  • Opcode Fuzzy Hash: f6fde58305ba36d0f8fef869f7c9f31ae0ac6bdb45d9d84c32e814425d4b9512
                                                  • Instruction Fuzzy Hash: 5CD0C9357D4311BAE7B8AB709C0FFD76A16BB50B51F011825B349AA5D0D9E09800C694
                                                  APIs
                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 006059AE
                                                  • PostMessageW.USER32(00000000), ref: 006059B5
                                                    • Part of subcall function 005E5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 005E52BC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2127311429.0000000000581000.00000020.00000001.01000000.00000003.sdmp, Offset: 00580000, based on PE: true
                                                  • Associated: 00000000.00000002.2127291385.0000000000580000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.000000000060F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127368268.0000000000634000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127444822.000000000063E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2127468063.0000000000647000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_580000_INVOICE NO.jbxd
                                                  Similarity
                                                  • API ID: FindMessagePostSleepWindow
                                                  • String ID: Shell_TrayWnd
                                                  • API String ID: 529655941-2988720461
                                                  • Opcode ID: 49165b98c39b9cfabdcec40405205d970f05bd3f5fd075cda3d3ab67e55fcead
                                                  • Instruction ID: 52b085ef9320d9740abe0790f89ded549ba21dcb735b6ac4b766077454d72a0c
                                                  • Opcode Fuzzy Hash: 49165b98c39b9cfabdcec40405205d970f05bd3f5fd075cda3d3ab67e55fcead
                                                  • Instruction Fuzzy Hash: 0BD0C9317C43117AE7B9AB709C0FFD76A16BB54B51F011825B345AA5D0D9E0A800C694